Loading ...

Play interactive tourEdit tour

Analysis Report PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe

Overview

General Information

Sample Name:PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
Analysis ID:324081
MD5:b3cb5b2bc5c3033b1008ed7f7f6312db
SHA1:3fd8e55a12bdf35200ee43e210951825ad0293d3
SHA256:042ef647920e37e8da471c1bfbc36490ee6bf93ceee75cd90161823ae74d458b
Tags:exe

Most interesting Screenshot:

Detection

AgentTesla
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000B.00000002.918795043.00000000036E4000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000B.00000002.917038973.0000000002680000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000B.00000002.916512263.0000000002380000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000B.00000003.765764476.000000000086E000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2380000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2680000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2380000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2680000.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                    Sigma Overview

                    No Sigma rule has matched

                    Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Multi AV Scanner detection for submitted fileShow sources
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeReversingLabs: Detection: 56%
                    Machine Learning detection for sampleShow sources
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeJoe Sandbox ML: detected
                    Source: 11.1.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
                    Source: Joe Sandbox ViewIP Address: 162.159.137.232 162.159.137.232
                    Source: Joe Sandbox ViewIP Address: 162.159.135.233 162.159.135.233
                    Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
                    Source: unknownDNS traffic detected: queries for: discord.com
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpString found in binary or memory: ftp://ftp.kunwersachdev.com/maerst
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpString found in binary or memory: http://JvKUzM.com
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeString found in binary or memory: http://gorohov.narod.ru/index.htm
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeString found in binary or memory: http://gorohov.narod.ru/index.htmS
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443

                    System Summary:

                    barindex
                    Initial sample is a PE file and has a suspicious nameShow sources
                    Source: initial sampleStatic PE information: Filename: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00408C60
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_0040DC11
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00407C3F
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00418CCC
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00406CA0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004028B0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_0041A4BE
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00418244
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00401650
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00402F20
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004193C4
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00418788
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00402F89
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00402B90
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004073A0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_023EF758
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_023E3D93
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_023E0C60
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_023E0C50
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_04A700E0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_04A700D0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_04A70073
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_05BB4950
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_05BB2A38
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_05BB1E20
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_05BB2168
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00408C60
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_0040DC11
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00407C3F
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00418CCC
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00406CA0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_004028B0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_0041A4BE
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00418244
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00401650
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00402F20
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_004193C4
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00418788
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00402F89
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00402B90
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_004073A0
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: String function: 0040D606 appears 48 times
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: String function: 0040E1D8 appears 88 times
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeStatic PE information: invalid certificate
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918795043.00000000036E4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLkFCDrqOCOdatOyKIEUEwX.exe4 vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918795043.00000000036E4000.00000004.00000001.sdmpBinary or memory string: OriginalFilename_.dll4 vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919463877.0000000004A40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919787092.0000000005750000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewbemdisp.tlbj% vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919446938.0000000004A30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919809687.0000000005760000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.917830550.000000000273A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameclrjit.dllT vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.917830550.000000000273A000.00000004.00000001.sdmpBinary or memory string: OriginalFilename vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.917830550.000000000273A000.00000004.00000001.sdmpBinary or memory string: 3l,\\StringFileInfo\\040904B0\\OriginalFilename vs PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeSection loaded: mscorjit.dll
                    Source: classification engineClassification label: mal92.troj.evad.winEXE@3/0@2/2
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCommand line argument: 08A
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCommand line argument: 08A
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCommand line argument: 08A
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeReversingLabs: Detection: 56%
                    Source: unknownProcess created: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe 'C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe'
                    Source: unknownProcess created: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess created: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeStatic file information: File size 1218752 > 1048576
                    Source: Binary string: _.pdb source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918795043.00000000036E4000.00000004.00000001.sdmp

                    Data Obfuscation:

                    barindex
                    Detected unpacking (changes PE section rights)Show sources
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeUnpacked PE file: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.400000.0.unpack CODE:ER;DATA:W;BSS:W;.idata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                    Detected unpacking (overwrites its own PE header)Show sources
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeUnpacked PE file: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041C6470 push ecx; mov dword ptr [esp], edx
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DA574 push 0042AB4Bh; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041C658C push ecx; mov dword ptr [esp], edx
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041C65D0 push ecx; mov dword ptr [esp], edx
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041E55CC push ecx; mov dword ptr [esp], ecx
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041D8678 push 00428C2Ch; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041D86B8 push 00428C6Ch; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041D96A0 push 00429C66h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041C46C4 push 00414C99h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041D96E8 push 00429C9Ch; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041D9720 push 00429CE0h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041BD77C push 0040DE80h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041C478C push 00414D40h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DF014 push 0042F611h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DC08C push 0042C640h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DF08C push 0042F66Dh; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041F1088 push 0044163Ch; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DC0C4 push 0042C678h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DC0FC push 0042C6B0h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DE0F8 push 0042E6D9h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DC13C push 0042C6F0h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041B613C push 004066F0h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041BE144 push 0040E6F8h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DC174 push 0042C728h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DE194 push 0042E754h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041B61B4 push 00406768h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DC1AC push 0042C760h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DB1D4 push 0042B7A8h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DC1E4 push 0042C798h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041B71E0 push 00407794h; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 0_3_041DE228 push 0042E7DCh; ret
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeFile created: \pro forma invoice - - magautkcp (24-nov-20).exe
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion:

                    barindex
                    Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeWindow / User API: threadDelayed 639
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeWindow / User API: threadDelayed 9198
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe TID: 5596Thread sleep count: 49 > 30
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe TID: 5596Thread sleep time: -45194522980588373s >= -30000s
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe TID: 5512Thread sleep count: 639 > 30
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe TID: 5512Thread sleep count: 9198 > 30
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919809687.0000000005760000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919809687.0000000005760000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919809687.0000000005760000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.919809687.0000000005760000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_0040ADB0 GetProcessHeap,HeapFree,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_004123F1 SetUnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_1_004123F1 SetUnhandledExceptionFilter,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion:

                    barindex
                    Injects a PE file into a foreign processesShow sources
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeMemory written: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeProcess created: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.916311863.0000000000CB0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.916311863.0000000000CB0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.916311863.0000000000CB0000.00000002.00000001.sdmpBinary or memory string: Progman
                    Source: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.916311863.0000000000CB0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: GetLocaleInfoA,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: GetLocaleInfoA,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeQueries volume information: unknown VolumeInformation
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_00412A15 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeCode function: 11_2_05BB4744 GetUserNameW,
                    Source: C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 0000000B.00000002.918795043.00000000036E4000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.917038973.0000000002680000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.916512263.0000000002380000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.765764476.000000000086E000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.916402342.00000000022A6000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe PID: 6944, type: MEMORY
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2380000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2680000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2380000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2680000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe PID: 6944, type: MEMORY

                    Remote Access Functionality:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 0000000B.00000002.918795043.00000000036E4000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.917038973.0000000002680000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.916512263.0000000002380000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000003.765764476.000000000086E000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.916402342.00000000022A6000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe PID: 6944, type: MEMORY
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2380000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2680000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2380000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.2680000.2.raw.unpack, type: UNPACKEDPE

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Process Injection112Virtualization/Sandbox Evasion13OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsDLL Side-Loading1Disable or Modify Tools1LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsNative API1Logon Script (Windows)Logon Script (Windows)Process Injection112Security Account ManagerSecurity Software Discovery141SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsProcess Discovery3SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing21Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncAccount Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingSystem Information Discovery124Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    SourceDetectionScannerLabelLink
                    PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe56%ReversingLabsWin32.Infostealer.Fareit
                    PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe100%Joe Sandbox ML

                    Dropped Files

                    No Antivirus matches

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    11.1.PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

                    Domains

                    No Antivirus matches

                    URLs

                    SourceDetectionScannerLabelLink
                    ftp://ftp.kunwersachdev.com/maerst0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://JvKUzM.com0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

                    Domains and IPs

                    Contacted Domains

                    NameIPActiveMaliciousAntivirus DetectionReputation
                    discord.com
                    162.159.137.232
                    truefalse
                      unknown
                      cdn.discordapp.com
                      162.159.135.233
                      truefalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        ftp://ftp.kunwersachdev.com/maerstPRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSPRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://JvKUzM.comPRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://gorohov.narod.ru/index.htmSPRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exefalse
                          high
                          http://gorohov.narod.ru/index.htmPRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exefalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haPRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xPRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpfalse
                              high
                              https://api.ipify.orgGETMozilla/5.0PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe, 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              162.159.137.232
                              unknownUnited States
                              13335CLOUDFLARENETUSfalse
                              162.159.135.233
                              unknownUnited States
                              13335CLOUDFLARENETUSfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:324081
                              Start date:28.11.2020
                              Start time:10:30:16
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 8m 3s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:19
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal92.troj.evad.winEXE@3/0@2/2
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 4.8% (good quality ratio 4.6%)
                              • Quality average: 82.9%
                              • Quality standard deviation: 26.9%
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 40.88.32.150, 51.11.168.160, 92.122.213.194, 92.122.213.247, 52.255.188.83, 2.20.142.209, 2.20.142.210, 52.155.217.156, 20.54.26.129, 51.104.144.132
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/324081/sample/PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              10:31:06API Interceptor406x Sleep call for process: PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              162.159.137.232MT103---USD42880.45---20201127--dbs--9900.exeGet hashmaliciousBrowse
                                RFQ For TRANS ANATOLIAN NATURAL GAS PIPELINE (TANAP) - PHASE 1(Package 2).exeGet hashmaliciousBrowse
                                  Scan 25112020 pdf.exeGet hashmaliciousBrowse
                                    Q21rQw2C4o.exeGet hashmaliciousBrowse
                                      tzjEwwwbqK.exeGet hashmaliciousBrowse
                                        oUI0jQS8xQ.exeGet hashmaliciousBrowse
                                          NyUnwsFSCa.exeGet hashmaliciousBrowse
                                            PO#0007507_009389283882873PDF.exeGet hashmaliciousBrowse
                                              LAX28102020HBL_AMSLAX1056_CTLQD06J0BL_PO_DTH266278_RFQ.exeGet hashmaliciousBrowse
                                                8fJPaTfN8D.exeGet hashmaliciousBrowse
                                                  LJLMG5Syza.exeGet hashmaliciousBrowse
                                                    oAkfKRTCvN.exeGet hashmaliciousBrowse
                                                      eybgvwBamW.exeGet hashmaliciousBrowse
                                                        R#U00d6SLER Puchase_tcs 10-28-2020,pdf.exeGet hashmaliciousBrowse
                                                          #U8ba2#U5355#U786e#U8ba4,pdf.exeGet hashmaliciousBrowse
                                                            Documentos_ordine.exeGet hashmaliciousBrowse
                                                              ShipmentReceipt.exeGet hashmaliciousBrowse
                                                                ShipmentReceipt.exeGet hashmaliciousBrowse
                                                                  PO102620.exeGet hashmaliciousBrowse
                                                                    Albawardi Group Project offer description 678467463756382020.exeGet hashmaliciousBrowse
                                                                      162.159.135.233Vessel details.docGet hashmaliciousBrowse
                                                                      • cdn.discordapp.com/attachments/780175015496777751/781048233136226304/mocux.exe
                                                                      Teklif Rusya 24 09 2020.docGet hashmaliciousBrowse
                                                                      • cdn.discordapp.com/attachments/733818080668680222/758418625429372978/p2.jpg

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      discord.comSTATEMENT OF ACCOUNT.exeGet hashmaliciousBrowse
                                                                      • 162.159.128.233
                                                                      XcOxlmOz4D.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      fAhW3JEGaZ.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      HIp08HPg20.exeGet hashmaliciousBrowse
                                                                      • 162.159.128.233
                                                                      MT103---USD42880.45---20201127--dbs--9900.exeGet hashmaliciousBrowse
                                                                      • 162.159.137.232
                                                                      caw.exeGet hashmaliciousBrowse
                                                                      • 162.159.138.232
                                                                      lxpo.exeGet hashmaliciousBrowse
                                                                      • 162.159.128.233
                                                                      SpecificationX20202611.xlsxGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      RFQ For TRANS ANATOLIAN NATURAL GAS PIPELINE (TANAP) - PHASE 1(Package 2).exeGet hashmaliciousBrowse
                                                                      • 162.159.137.232
                                                                      Scan 25112020 pdf.exeGet hashmaliciousBrowse
                                                                      • 162.159.137.232
                                                                      Piraeus Bank_swift_.exeGet hashmaliciousBrowse
                                                                      • 162.159.128.233
                                                                      Q21rQw2C4o.exeGet hashmaliciousBrowse
                                                                      • 162.159.137.232
                                                                      Q21rQw2C4o.exeGet hashmaliciousBrowse
                                                                      • 162.159.128.233
                                                                      tzjEwwwbqK.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      DHL_Express_Consignment_Details.exeGet hashmaliciousBrowse
                                                                      • 162.159.138.232
                                                                      New Microsoft Office Excel Worksheet.xlsxGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      Komfkim_Signed_.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.232
                                                                      oUI0jQS8xQ.exeGet hashmaliciousBrowse
                                                                      • 162.159.137.232
                                                                      USD67,884.08_Payment_Advise_9083008849.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      USD55,260.84_PAYMENT_ADVICE_NOTE_FROM_20.11.2020.EXEGet hashmaliciousBrowse
                                                                      • 162.159.138.232
                                                                      cdn.discordapp.comSTATEMENT OF ACCOUNT.exeGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      OVERDUE INVOICE.xlsGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      MT103---USD42880.45---20201127--dbs--9900.exeGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      Vessel details.docGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      RFQ For TRANS ANATOLIAN NATURAL GAS PIPELINE (TANAP) - PHASE 1(Package 2).exeGet hashmaliciousBrowse
                                                                      • 162.159.130.233
                                                                      Scan 25112020 pdf.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      Piraeus Bank_swift_.exeGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      Q21rQw2C4o.exeGet hashmaliciousBrowse
                                                                      • 162.159.130.233
                                                                      Q21rQw2C4o.exeGet hashmaliciousBrowse
                                                                      • 162.159.133.233
                                                                      tzjEwwwbqK.exeGet hashmaliciousBrowse
                                                                      • 162.159.130.233
                                                                      DHL_Express_Consignment_Details.exeGet hashmaliciousBrowse
                                                                      • 162.159.133.233
                                                                      New Microsoft Office Excel Worksheet.xlsxGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      INV SF2910202.docGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      Komfkim_Signed_.exeGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      oUI0jQS8xQ.exeGet hashmaliciousBrowse
                                                                      • 162.159.130.233
                                                                      USD55,260.84_PAYMENT_ADVICE_NOTE_FROM_20.11.2020.EXEGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      NyUnwsFSCa.exeGet hashmaliciousBrowse
                                                                      • 162.159.133.233
                                                                      1099008FEDEX_090887766.xlsGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      1099008FEDEX_090887766.xlsGet hashmaliciousBrowse
                                                                      • 162.159.134.233
                                                                      PO#0007507_009389283882873PDF.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      CLOUDFLARENETUSSTATEMENT OF ACCOUNT.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      XcOxlmOz4D.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      fAhW3JEGaZ.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      HIp08HPg20.exeGet hashmaliciousBrowse
                                                                      • 104.23.98.190
                                                                      case.8920.xlsGet hashmaliciousBrowse
                                                                      • 104.27.186.55
                                                                      case.8920.xlsGet hashmaliciousBrowse
                                                                      • 172.67.212.16
                                                                      OVERDUE INVOICE.xlsGet hashmaliciousBrowse
                                                                      • 172.67.143.180
                                                                      Venom.exeGet hashmaliciousBrowse
                                                                      • 104.23.98.190
                                                                      PO348578.jarGet hashmaliciousBrowse
                                                                      • 104.23.99.190
                                                                      MT103---USD42880.45---20201127--dbs--9900.exeGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      notif8372.xlsGet hashmaliciousBrowse
                                                                      • 104.24.117.11
                                                                      notif8372.xlsGet hashmaliciousBrowse
                                                                      • 172.67.222.45
                                                                      SecuriteInfo.com.Heur.23770.xlsGet hashmaliciousBrowse
                                                                      • 104.31.87.226
                                                                      2020-11-27-ZLoader-DLL-example-01.dllGet hashmaliciousBrowse
                                                                      • 172.67.155.205
                                                                      2020-11-27-ZLoader-DLL-example-02.dllGet hashmaliciousBrowse
                                                                      • 172.67.155.205
                                                                      2020-11-27-ZLoader-DLL-example-03.dllGet hashmaliciousBrowse
                                                                      • 104.27.143.240
                                                                      SecuriteInfo.com.Heur.23770.xlsGet hashmaliciousBrowse
                                                                      • 104.31.86.226
                                                                      Final_report_2020.htmlGet hashmaliciousBrowse
                                                                      • 104.16.18.94
                                                                      norit.dllGet hashmaliciousBrowse
                                                                      • 104.31.69.174
                                                                      380000_USD_INV_011740_NOV_2020.jarGet hashmaliciousBrowse
                                                                      • 104.20.22.46
                                                                      CLOUDFLARENETUSSTATEMENT OF ACCOUNT.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      XcOxlmOz4D.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      fAhW3JEGaZ.exeGet hashmaliciousBrowse
                                                                      • 162.159.136.232
                                                                      HIp08HPg20.exeGet hashmaliciousBrowse
                                                                      • 104.23.98.190
                                                                      case.8920.xlsGet hashmaliciousBrowse
                                                                      • 104.27.186.55
                                                                      case.8920.xlsGet hashmaliciousBrowse
                                                                      • 172.67.212.16
                                                                      OVERDUE INVOICE.xlsGet hashmaliciousBrowse
                                                                      • 172.67.143.180
                                                                      Venom.exeGet hashmaliciousBrowse
                                                                      • 104.23.98.190
                                                                      PO348578.jarGet hashmaliciousBrowse
                                                                      • 104.23.99.190
                                                                      MT103---USD42880.45---20201127--dbs--9900.exeGet hashmaliciousBrowse
                                                                      • 162.159.129.233
                                                                      notif8372.xlsGet hashmaliciousBrowse
                                                                      • 104.24.117.11
                                                                      notif8372.xlsGet hashmaliciousBrowse
                                                                      • 172.67.222.45
                                                                      SecuriteInfo.com.Heur.23770.xlsGet hashmaliciousBrowse
                                                                      • 104.31.87.226
                                                                      2020-11-27-ZLoader-DLL-example-01.dllGet hashmaliciousBrowse
                                                                      • 172.67.155.205
                                                                      2020-11-27-ZLoader-DLL-example-02.dllGet hashmaliciousBrowse
                                                                      • 172.67.155.205
                                                                      2020-11-27-ZLoader-DLL-example-03.dllGet hashmaliciousBrowse
                                                                      • 104.27.143.240
                                                                      SecuriteInfo.com.Heur.23770.xlsGet hashmaliciousBrowse
                                                                      • 104.31.86.226
                                                                      Final_report_2020.htmlGet hashmaliciousBrowse
                                                                      • 104.16.18.94
                                                                      norit.dllGet hashmaliciousBrowse
                                                                      • 104.31.69.174
                                                                      380000_USD_INV_011740_NOV_2020.jarGet hashmaliciousBrowse
                                                                      • 104.20.22.46

                                                                      JA3 Fingerprints

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      ce5f3254611a8c095a3d821d44539877STATEMENT OF ACCOUNT.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      caw.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      6znqz0d1.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      INV-FATURA010009.xlsxGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      INV-FATURA010009.xlsxGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      2zv940v7.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      RFQ For TRANS ANATOLIAN NATURAL GAS PIPELINE (TANAP) - PHASE 1(Package 2).exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      Izezma64.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      fuxenm32.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      api-cdef.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      Scan 25112020 pdf.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      tarifvertrag_igbce_weihnachtsgeld_k#U00fcndigung.jsGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      tarifvertrag_igbce_weihnachtsgeld_k#U00fcndigung.jsGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      Piraeus Bank_swift_.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      FxzOwcXb7x.exeGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      Izipubob.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      nivude1.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      Accesshover.dllGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      data7195700.xlsGet hashmaliciousBrowse
                                                                      • 162.159.135.233
                                                                      PAYMENT COPY.xlsGet hashmaliciousBrowse
                                                                      • 162.159.135.233

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      No created / dropped files found

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):7.110241254206797
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.24%
                                                                      • InstallShield setup (43055/19) 0.43%
                                                                      • Win32 Executable Delphi generic (14689/80) 0.15%
                                                                      • Windows Screen Saver (13104/52) 0.13%
                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                      File name:PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                                                                      File size:1218752
                                                                      MD5:b3cb5b2bc5c3033b1008ed7f7f6312db
                                                                      SHA1:3fd8e55a12bdf35200ee43e210951825ad0293d3
                                                                      SHA256:042ef647920e37e8da471c1bfbc36490ee6bf93ceee75cd90161823ae74d458b
                                                                      SHA512:3724f52089d06f1260f1b6c0ddf73326d44e5b16a12fc99b868c831e481b1edab29fac4695f64e222679d936789455f6c2ce38e5cdfc595d73352faafd321836
                                                                      SSDEEP:24576:3RVtvQ+csIDccuZGhe1ppCmfwybRm8zQKtALblKCeNRbO+v:3R/ovVcOM1pJwYFzQ0t
                                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

                                                                      File Icon

                                                                      Icon Hash:b2989692969ed26a

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x47f698
                                                                      Entrypoint Section:CODE
                                                                      Digitally signed:true
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, UP_SYSTEM_ONLY, LARGE_ADDRESS_AWARE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
                                                                      DLL Characteristics:
                                                                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:191f8035b5c11d5de8fd20cfdada0df2

                                                                      Authenticode Signature

                                                                      Signature Valid:false
                                                                      Signature Issuer:CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                                                                      Signature Validation Error:The digital signature of the object did not verify
                                                                      Error Number:-2146869232
                                                                      Not Before, Not After
                                                                      • 8/18/2016 10:17:17 PM 11/2/2017 9:17:17 PM
                                                                      Subject Chain
                                                                      • CN=Microsoft Corporation, OU=MOPR, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                                                                      Version:3
                                                                      Thumbprint MD5:3B66EDDAB891B79FEDB150AC2C59DB3A
                                                                      Thumbprint SHA-1:98ED99A67886D020C564923B7DF25E9AC019DF26
                                                                      Thumbprint SHA-256:57DD481BF26C0A55C3E867B2D6C6978BEAF5CE3509325CA2607D853F9349A9FF
                                                                      Serial:330000014096A9EE7056FECC07000100000140

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      add esp, FFFFFFF0h
                                                                      mov eax, 0047F418h
                                                                      call 00007F07A4909C35h
                                                                      push 0000001Eh
                                                                      pop ebx
                                                                      push eax
                                                                      mov eax, dword ptr [00481FE8h]
                                                                      mov eax, dword ptr [eax]
                                                                      call 00007F07A4960A39h
                                                                      mov eax, dword ptr [00481FE8h]
                                                                      mov eax, dword ptr [eax]
                                                                      mov edx, 0047F708h
                                                                      call 00007F07A4960628h
                                                                      mov ecx, dword ptr [00481F6Ch]
                                                                      mov eax, dword ptr [00481FE8h]
                                                                      mov eax, dword ptr [eax]
                                                                      mov edx, dword ptr [0047EF20h]
                                                                      call 00007F07A4960A28h
                                                                      mov eax, dword ptr [00481FE8h]
                                                                      mov eax, dword ptr [eax]
                                                                      mov byte ptr [eax+5Bh], 00000000h
                                                                      mov eax, dword ptr [00481FE8h]
                                                                      mov eax, dword ptr [eax]
                                                                      call 00007F07A4960A91h
                                                                      call 00007F07A4907724h
                                                                      add byte ptr [eax], al
                                                                      add bh, bh

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x850000x24ca.idata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x930000x97c00.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x1244000x54c0.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000x8f34.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x890000x18.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      CODE0x10000x7e7140x7e800False0.523837002841data6.52444996172IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      DATA0x800000x219c0x2200False0.390969669118data4.54957969266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      BSS0x830000x11350x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      .idata0x850000x24ca0x2600False0.354851973684data4.81311536495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      .tls0x880000x400x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x890000x180x200False0.05078125data0.184150656087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                      .reloc0x8a0000x8f340x9000False0.559760199653data6.63092268857IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x930000x97c000x97c00False0.509374678233data6.97981181424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_CURSOR0x93c0c0x134data
                                                                      RT_CURSOR0x93d400x134data
                                                                      RT_CURSOR0x93e740x134data
                                                                      RT_CURSOR0x93fa80x134data
                                                                      RT_CURSOR0x940dc0x134data
                                                                      RT_CURSOR0x942100x134data
                                                                      RT_CURSOR0x943440x134data
                                                                      RT_BITMAP0x944780x1d0data
                                                                      RT_BITMAP0x946480x1e4data
                                                                      RT_BITMAP0x9482c0x1d0data
                                                                      RT_BITMAP0x949fc0x1d0data
                                                                      RT_BITMAP0x94bcc0x1d0data
                                                                      RT_BITMAP0x94d9c0x1d0data
                                                                      RT_BITMAP0x94f6c0x1d0data
                                                                      RT_BITMAP0x9513c0x1d0data
                                                                      RT_BITMAP0x9530c0x1d0data
                                                                      RT_BITMAP0x954dc0x1d0data
                                                                      RT_BITMAP0x956ac0xe8GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                                      RT_ICON0x957940x10a8dataEnglishUnited States
                                                                      RT_ICON0x9683c0x25a8dataEnglishUnited States
                                                                      RT_ICON0x98de40x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 240, next used block 251658240EnglishUnited States
                                                                      RT_ICON0x9d00c0x5488dataEnglishUnited States
                                                                      RT_ICON0xa24940xac5cdataEnglishUnited States
                                                                      RT_DIALOG0xad0f00x52data
                                                                      RT_STRING0xad1440x314data
                                                                      RT_STRING0xad4580x1dcdata
                                                                      RT_STRING0xad6340x154data
                                                                      RT_STRING0xad7880x3a4data
                                                                      RT_STRING0xadb2c0x4bcdata
                                                                      RT_STRING0xadfe80xc0data
                                                                      RT_STRING0xae0a80xfcdata
                                                                      RT_STRING0xae1a40x120data
                                                                      RT_STRING0xae2c40x4c0data
                                                                      RT_STRING0xae7840x350data
                                                                      RT_STRING0xaead40x39cdata
                                                                      RT_STRING0xaee700x3b0data
                                                                      RT_STRING0xaf2200xf0data
                                                                      RT_STRING0xaf3100xc0data
                                                                      RT_STRING0xaf3d00x2d8data
                                                                      RT_STRING0xaf6a80x494data
                                                                      RT_STRING0xafb3c0x3acdata
                                                                      RT_STRING0xafee80x2d4data
                                                                      RT_RCDATA0xb01bc0x10data
                                                                      RT_RCDATA0xb01cc0x350data
                                                                      RT_RCDATA0xb051c0x7859aGIF image data, version 89a, 577 x 188EnglishUnited States
                                                                      RT_RCDATA0x128ab80x1f39Delphi compiled form 'T__882643936'
                                                                      RT_GROUP_CURSOR0x12a9f40x14Lotus unknown worksheet or configuration, revision 0x1
                                                                      RT_GROUP_CURSOR0x12aa080x14Lotus unknown worksheet or configuration, revision 0x1
                                                                      RT_GROUP_CURSOR0x12aa1c0x14Lotus unknown worksheet or configuration, revision 0x1
                                                                      RT_GROUP_CURSOR0x12aa300x14Lotus unknown worksheet or configuration, revision 0x1
                                                                      RT_GROUP_CURSOR0x12aa440x14Lotus unknown worksheet or configuration, revision 0x1
                                                                      RT_GROUP_CURSOR0x12aa580x14Lotus unknown worksheet or configuration, revision 0x1
                                                                      RT_GROUP_CURSOR0x12aa6c0x14Lotus unknown worksheet or configuration, revision 0x1
                                                                      RT_GROUP_ICON0x12aa800x4cdataEnglishUnited States

                                                                      Imports

                                                                      DLLImport
                                                                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                                      user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                      oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                      kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                      kernel32.dlllstrcpyA, lstrcmpiA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                                      version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                      gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetTextAlign, GetSystemPaletteEntries, GetStockObject, GetROP2, GetPolyFillMode, GetPixelFormat, GetPixel, GetPaletteEntries, GetObjectA, GetMapMode, GetGraphicsMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetDCPenColor, GetDCBrushColor, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBkMode, GetBkColor, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
                                                                      user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, ShowCaret, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawStateA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                      kernel32.dllSleep
                                                                      oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                                                      ole32.dllCoUninitialize, CoInitialize
                                                                      oleaut32.dllGetErrorInfo, SysFreeString
                                                                      comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                                      shell32.dllShellExecuteA
                                                                      winmm.dllsndPlaySoundA

                                                                      Possible Origin

                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States

                                                                      Network Behavior

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 28, 2020 10:31:07.618732929 CET49732443192.168.2.4162.159.137.232
                                                                      Nov 28, 2020 10:31:07.635231018 CET44349732162.159.137.232192.168.2.4
                                                                      Nov 28, 2020 10:31:07.635396004 CET49732443192.168.2.4162.159.137.232
                                                                      Nov 28, 2020 10:31:07.636028051 CET49732443192.168.2.4162.159.137.232
                                                                      Nov 28, 2020 10:31:07.652529955 CET44349732162.159.137.232192.168.2.4
                                                                      Nov 28, 2020 10:31:07.652559996 CET44349732162.159.137.232192.168.2.4
                                                                      Nov 28, 2020 10:31:07.652657032 CET49732443192.168.2.4162.159.137.232
                                                                      Nov 28, 2020 10:31:07.731426954 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:07.747754097 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:07.747883081 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:07.797060966 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:07.813452005 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:07.815418959 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:07.815448046 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:07.815462112 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:07.815733910 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:07.865027905 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:07.881252050 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:07.897581100 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:07.898933887 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:07.945055008 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.013133049 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.029519081 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057188988 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057210922 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057224035 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057240963 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057255030 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057267904 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057281017 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057291031 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057296991 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057316065 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057327986 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057341099 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057343960 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057358027 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057373047 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057403088 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057410002 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057410002 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057429075 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057446957 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057462931 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057463884 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057482004 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057499886 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057512999 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057518005 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057522058 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057531118 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057547092 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057565928 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057583094 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057595968 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057600975 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057609081 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057614088 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057631016 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057646036 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057662964 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057677984 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057678938 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057683945 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057698011 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057714939 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057729006 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057733059 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057734013 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057750940 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057765961 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057769060 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057784081 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057800055 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057815075 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057816982 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057835102 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057852983 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057856083 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057871103 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057887077 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057899952 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057900906 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057904005 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057917118 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057934999 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057939053 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057951927 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057971001 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.057986021 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.057991028 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.058003902 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.058007956 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.058027029 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.058043957 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.058054924 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.058062077 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.058079004 CET44349733162.159.135.233192.168.2.4
                                                                      Nov 28, 2020 10:31:08.058094025 CET49733443192.168.2.4162.159.135.233
                                                                      Nov 28, 2020 10:31:08.058094978 CET44349733162.159.135.233192.168.2.4

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 28, 2020 10:31:02.219085932 CET5585453192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:02.246105909 CET53558548.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:07.560221910 CET6454953192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:07.587306976 CET53645498.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:07.702680111 CET6315353192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:07.729708910 CET53631538.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:28.383827925 CET5299153192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:28.411088943 CET53529918.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:34.247920990 CET5370053192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:35.273853064 CET5370053192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:36.078322887 CET5172653192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:36.241617918 CET53517268.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:36.241916895 CET53537008.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:36.242775917 CET53537008.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:36.987870932 CET5679453192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:37.014924049 CET53567948.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:37.733671904 CET5653453192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:37.769320965 CET53565348.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:38.429485083 CET5662753192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:38.456552982 CET53566278.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:39.143574953 CET5662153192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:39.170844078 CET53566218.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:39.872354984 CET6311653192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:39.910217047 CET53631168.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:40.799295902 CET6407853192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:40.826457024 CET53640788.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:49.510163069 CET6480153192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:49.546915054 CET53648018.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:54.236198902 CET6172153192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:54.279809952 CET53617218.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:54.814912081 CET5125553192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:54.868314981 CET53512558.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:55.420306921 CET6152253192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:55.455759048 CET53615228.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:55.775741100 CET5233753192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:55.811485052 CET53523378.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:56.188901901 CET5504653192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:56.224395037 CET53550468.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:56.684010983 CET4961253192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:56.719657898 CET53496128.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:57.369980097 CET4928553192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:57.407788992 CET53492858.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:58.073167086 CET5060153192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:58.108619928 CET53506018.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:59.318715096 CET6087553192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:59.354480982 CET53608758.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:59.681447029 CET5644853192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:59.717175961 CET53564488.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:31:59.858293056 CET5917253192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:31:59.909159899 CET53591728.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:05.831170082 CET6242053192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:05.868024111 CET53624208.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:12.090886116 CET6057953192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:12.117989063 CET53605798.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:12.799681902 CET5018353192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:12.826797962 CET53501838.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:14.314152956 CET6153153192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:14.341248989 CET53615318.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:15.578613043 CET4922853192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:15.605720043 CET53492288.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:17.442347050 CET5979453192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:17.477639914 CET53597948.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:44.223612070 CET5591653192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:44.250850916 CET53559168.8.8.8192.168.2.4
                                                                      Nov 28, 2020 10:32:45.968452930 CET5275253192.168.2.48.8.8.8
                                                                      Nov 28, 2020 10:32:46.004127026 CET53527528.8.8.8192.168.2.4

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Nov 28, 2020 10:31:07.560221910 CET192.168.2.48.8.8.80x6e3cStandard query (0)discord.comA (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.702680111 CET192.168.2.48.8.8.80x3a8Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Nov 28, 2020 10:31:07.587306976 CET8.8.8.8192.168.2.40x6e3cNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.587306976 CET8.8.8.8192.168.2.40x6e3cNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.587306976 CET8.8.8.8192.168.2.40x6e3cNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.587306976 CET8.8.8.8192.168.2.40x6e3cNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.587306976 CET8.8.8.8192.168.2.40x6e3cNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.729708910 CET8.8.8.8192.168.2.40x3a8No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.729708910 CET8.8.8.8192.168.2.40x3a8No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.729708910 CET8.8.8.8192.168.2.40x3a8No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.729708910 CET8.8.8.8192.168.2.40x3a8No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                                                                      Nov 28, 2020 10:31:07.729708910 CET8.8.8.8192.168.2.40x3a8No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)

                                                                      HTTPS Packets

                                                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                      Nov 28, 2020 10:31:07.815462112 CET162.159.135.233443192.168.2.449733CN=ssl711320.cloudflaressl.com CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Oct 27 01:00:00 CET 2020 Thu Sep 25 02:00:00 CEST 2014 Thu Jan 01 01:00:00 CET 2004Thu May 06 01:59:59 CEST 2021 Tue Sep 25 01:59:59 CEST 2029 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                                                                      CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Sep 25 02:00:00 CEST 2014Tue Sep 25 01:59:59 CEST 2029
                                                                      CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:10:31:05
                                                                      Start date:28/11/2020
                                                                      Path:C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe'
                                                                      Imagebase:0x400000
                                                                      File size:1218752 bytes
                                                                      MD5 hash:B3CB5B2BC5C3033B1008ED7F7F6312DB
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Borland Delphi
                                                                      Reputation:low

                                                                      General

                                                                      Start time:10:31:59
                                                                      Start date:28/11/2020
                                                                      Path:C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\Desktop\PRO FORMA INVOICE - - MAGAUTKCP (24-Nov-20).exe
                                                                      Imagebase:0x400000
                                                                      File size:1218752 bytes
                                                                      MD5 hash:B3CB5B2BC5C3033B1008ED7F7F6312DB
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.918795043.00000000036E4000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.917038973.0000000002680000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.916512263.0000000002380000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000003.765764476.000000000086E000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.918550525.00000000027B7000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.916402342.00000000022A6000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >