Loading ...

Play interactive tourEdit tour

Analysis Report list of P.O.exe

Overview

General Information

Sample Name:list of P.O.exe
Analysis ID:326337
MD5:4bc8c3c14ccfe94a9eea971644f48469
SHA1:36c93a58dd879a3fc56c38297d05a5bcd89ea7e7
SHA256:a2b202778eb54dc48fd49a2f90b7e6619f20c6d0c907d386da68e9c32fbcb68c
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
.NET source code contains very large strings
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • list of P.O.exe (PID: 7156 cmdline: 'C:\Users\user\Desktop\list of P.O.exe' MD5: 4BC8C3C14CCFE94A9EEA971644F48469)
    • list of P.O.exe (PID: 6224 cmdline: C:\Users\user\Desktop\list of P.O.exe MD5: 4BC8C3C14CCFE94A9EEA971644F48469)
  • newapp.exe (PID: 6516 cmdline: 'C:\Users\user\AppData\Roaming\newapp\newapp.exe' MD5: 4BC8C3C14CCFE94A9EEA971644F48469)
    • newapp.exe (PID: 6816 cmdline: C:\Users\user\AppData\Roaming\newapp\newapp.exe MD5: 4BC8C3C14CCFE94A9EEA971644F48469)
  • newapp.exe (PID: 4972 cmdline: 'C:\Users\user\AppData\Roaming\newapp\newapp.exe' MD5: 4BC8C3C14CCFE94A9EEA971644F48469)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "pPSkmfrJ9hO", "URL: ": "https://WMSJ15tuzJ0HQU3MhtVn.org", "To: ": "alex.zhang@sonoscepa.net", "ByHost: ": "smtp.sonoscepa.net:587", "Password: ": "gqxA9ZbxGmuCi", "From: ": "alex.zhang@sonoscepa.net"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000001.00000002.926206822.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 12 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            8.2.newapp.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.list of P.O.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                Sigma Overview

                No Sigma rule has matched

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: list of P.O.exe.6224.1.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "pPSkmfrJ9hO", "URL: ": "https://WMSJ15tuzJ0HQU3MhtVn.org", "To: ": "alex.zhang@sonoscepa.net", "ByHost: ": "smtp.sonoscepa.net:587", "Password: ": "gqxA9ZbxGmuCi", "From: ": "alex.zhang@sonoscepa.net"}
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeReversingLabs: Detection: 25%
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeJoe Sandbox ML: detected
                Machine Learning detection for sampleShow sources
                Source: list of P.O.exeJoe Sandbox ML: detected
                Source: 1.2.list of P.O.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 8.2.newapp.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 4x nop then jmp 04E7AD15h

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49755 -> 208.91.199.225:587
                Source: global trafficTCP traffic: 192.168.2.4:49755 -> 208.91.199.225:587
                Source: Joe Sandbox ViewIP Address: 208.91.199.225 208.91.199.225
                Source: global trafficTCP traffic: 192.168.2.4:49755 -> 208.91.199.225:587
                Source: unknownDNS traffic detected: queries for: smtp.sonoscepa.net
                Source: list of P.O.exe, 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: list of P.O.exe, 00000001.00000002.928767416.000000000307C000.00000004.00000001.sdmpString found in binary or memory: http://smtp.sonoscepa.net
                Source: list of P.O.exe, 00000001.00000002.928767416.000000000307C000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                Source: newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://vkloll.com
                Source: list of P.O.exe, 00000001.00000002.928802698.0000000003086000.00000004.00000001.sdmp, list of P.O.exe, 00000001.00000002.928753365.0000000003076000.00000004.00000001.sdmp, list of P.O.exe, 00000001.00000002.928675437.000000000303D000.00000004.00000001.sdmpString found in binary or memory: https://WMSJ15tuzJ0HQU3MhtVn.org
                Source: newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                Source: list of P.O.exe, 00000000.00000002.669608907.00000000033E9000.00000004.00000001.sdmp, list of P.O.exe, 00000001.00000002.926206822.0000000000402000.00000040.00000001.sdmp, newapp.exe, 00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.926206299.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                Source: list of P.O.exe, 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                Source: list of P.O.exe, newapp.exe, 00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.926206299.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: list of P.O.exe, 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 1.2.list of P.O.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE872A713u002d3E8Cu002d484Eu002d94F8u002dC04E52E968DAu007d/u003818D8455u002d59A3u002d4094u002dB9D9u002d312F3F825297.csLarge array initialization: .cctor: array initializer size 11962
                Source: 8.2.newapp.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE872A713u002d3E8Cu002d484Eu002d94F8u002dC04E52E968DAu007d/u003818D8455u002d59A3u002d4094u002dB9D9u002d312F3F825297.csLarge array initialization: .cctor: array initializer size 11962
                .NET source code contains very large stringsShow sources
                Source: list of P.O.exe, MainModule.csLong String: Length: 81136
                Source: 0.0.list of P.O.exe.10000.0.unpack, MainModule.csLong String: Length: 81136
                Source: 0.2.list of P.O.exe.10000.0.unpack, MainModule.csLong String: Length: 81136
                Source: newapp.exe.1.dr, MainModule.csLong String: Length: 81136
                Source: 1.0.list of P.O.exe.850000.0.unpack, MainModule.csLong String: Length: 81136
                Source: 1.2.list of P.O.exe.850000.1.unpack, MainModule.csLong String: Length: 81136
                Source: 5.2.newapp.exe.670000.0.unpack, MainModule.csLong String: Length: 81136
                Source: 5.0.newapp.exe.670000.0.unpack, MainModule.csLong String: Length: 81136
                Source: 8.2.newapp.exe.4d0000.1.unpack, MainModule.csLong String: Length: 81136
                Source: 8.0.newapp.exe.4d0000.0.unpack, MainModule.csLong String: Length: 81136
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_00A1A908
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_00A19A18
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_00A17F70
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_04E777E0
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_04E735FC
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_04E76E20
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_04E76E13
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_04E777D1
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 0_2_00019761
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_004055FC
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011A46A0
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011A461A
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011AD980
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011E4880
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011EBA30
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011E6E24
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011E9258
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011E0040
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_01253040
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_012592E8
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_0125462C
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_00859761
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 5_2_0294A908
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 5_2_02947F70
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 5_2_02949CF0
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 5_2_02946BC7
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 5_2_00679761
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 8_2_026546A0
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 8_2_026545B0
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 8_2_0265D980
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 8_2_004D9761
                Source: list of P.O.exe, 00000000.00000002.674920597.0000000026280000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNT1.dll, vs list of P.O.exe
                Source: list of P.O.exe, 00000000.00000000.661062926.00000000000B2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDictionaryNode.exe@ vs list of P.O.exe
                Source: list of P.O.exe, 00000000.00000002.669608907.00000000033E9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameGlaxoSmithKline.dll@ vs list of P.O.exe
                Source: list of P.O.exe, 00000000.00000002.669608907.00000000033E9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXZWRRXtkFEFbKFPTrQkenPzvprcODpESzrmrVO.exe4 vs list of P.O.exe
                Source: list of P.O.exeBinary or memory string: OriginalFilename vs list of P.O.exe
                Source: list of P.O.exe, 00000001.00000002.927586303.0000000001200000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs list of P.O.exe
                Source: list of P.O.exe, 00000001.00000002.926206822.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameXZWRRXtkFEFbKFPTrQkenPzvprcODpESzrmrVO.exe4 vs list of P.O.exe
                Source: list of P.O.exe, 00000001.00000000.667728980.00000000008F2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDictionaryNode.exe@ vs list of P.O.exe
                Source: list of P.O.exe, 00000001.00000002.926535911.0000000000CF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs list of P.O.exe
                Source: list of P.O.exe, 00000001.00000002.932653118.0000000005FC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs list of P.O.exe
                Source: list of P.O.exeBinary or memory string: OriginalFilenameDictionaryNode.exe@ vs list of P.O.exe
                Source: list of P.O.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: newapp.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: 1.2.list of P.O.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 1.2.list of P.O.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 8.2.newapp.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 8.2.newapp.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/4@2/1
                Source: C:\Users\user\Desktop\list of P.O.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\list of P.O.exe.logJump to behavior
                Source: list of P.O.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\list of P.O.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\list of P.O.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\list of P.O.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\list of P.O.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\list of P.O.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Users\user\Desktop\list of P.O.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\list of P.O.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\list of P.O.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\list of P.O.exeFile read: C:\Users\user\Desktop\list of P.O.exe:Zone.IdentifierJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\list of P.O.exe 'C:\Users\user\Desktop\list of P.O.exe'
                Source: unknownProcess created: C:\Users\user\Desktop\list of P.O.exe C:\Users\user\Desktop\list of P.O.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe 'C:\Users\user\AppData\Roaming\newapp\newapp.exe'
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe C:\Users\user\AppData\Roaming\newapp\newapp.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe 'C:\Users\user\AppData\Roaming\newapp\newapp.exe'
                Source: C:\Users\user\Desktop\list of P.O.exeProcess created: C:\Users\user\Desktop\list of P.O.exe C:\Users\user\Desktop\list of P.O.exe
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe C:\Users\user\AppData\Roaming\newapp\newapp.exe
                Source: C:\Users\user\Desktop\list of P.O.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\list of P.O.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: list of P.O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: list of P.O.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_00FBE38A push eax; ret
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_00FBD95C push eax; ret
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_00FBE332 push eax; ret
                Source: C:\Users\user\Desktop\list of P.O.exeCode function: 1_2_011EB250 pushfd ; retf
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 5_2_0294003C push eax; iretd
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 5_2_02941C97 push ebx; iretd
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 8_2_00B3D95C push eax; ret
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 8_2_00B3E348 push eax; ret
                Source: initial sampleStatic PE information: section name: .text entropy: 6.95700056065
                Source: initial sampleStatic PE information: section name: .text entropy: 6.95700056065
                Source: C:\Users\user\Desktop\list of P.O.exeFile created: C:\Users\user\AppData\Roaming\newapp\newapp.exeJump to dropped file
                Source: C:\Users\user\Desktop\list of P.O.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior
                Source: C:\Users\user\Desktop\list of P.O.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Users\user\AppData\Roaming\newapp\newapp.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\list of P.O.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Yara detected AntiVM_3Show sources
                Source: Yara matchFile source: 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.669167585.00000000023E1000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: list of P.O.exe PID: 7156, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 6516, type: MEMORY
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\list of P.O.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\list of P.O.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                Source: list of P.O.exe, 00000000.00000002.669167585.00000000023E1000.00000004.00000001.sdmp, newapp.exe, 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                Source: list of P.O.exe, 00000000.00000002.669167585.00000000023E1000.00000004.00000001.sdmp, newapp.exe, 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\list of P.O.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\list of P.O.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\list of P.O.exeWindow / User API: threadDelayed 1373
                Source: C:\Users\user\Desktop\list of P.O.exeWindow / User API: threadDelayed 8470
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 3821
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWindow / User API: threadDelayed 6002
                Source: C:\Users\user\Desktop\list of P.O.exe TID: 7160Thread sleep time: -53447s >= -30000s
                Source: C:\Users\user\Desktop\list of P.O.exe TID: 5744Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\list of P.O.exe TID: 3980Thread sleep time: -19369081277395017s >= -30000s
                Source: C:\Users\user\Desktop\list of P.O.exe TID: 4420Thread sleep count: 1373 > 30
                Source: C:\Users\user\Desktop\list of P.O.exe TID: 4420Thread sleep count: 8470 > 30
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 6524Thread sleep time: -49943s >= -30000s
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 6632Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 4600Thread sleep count: 37 > 30
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 4600Thread sleep time: -34126476536362649s >= -30000s
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 1504Thread sleep count: 3821 > 30
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 1504Thread sleep count: 6002 > 30
                Source: C:\Users\user\Desktop\list of P.O.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\list of P.O.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: newapp.exe, 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: newapp.exe, 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmpBinary or memory string: vmware
                Source: newapp.exe, 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                Source: newapp.exe, 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\list of P.O.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\list of P.O.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\list of P.O.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\user\Desktop\list of P.O.exeMemory written: C:\Users\user\Desktop\list of P.O.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\list of P.O.exeProcess created: C:\Users\user\Desktop\list of P.O.exe C:\Users\user\Desktop\list of P.O.exe
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe C:\Users\user\AppData\Roaming\newapp\newapp.exe
                Source: list of P.O.exe, 00000001.00000002.927738084.0000000001660000.00000002.00000001.sdmp, newapp.exe, 00000008.00000002.927326149.0000000001240000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: list of P.O.exe, 00000001.00000002.927738084.0000000001660000.00000002.00000001.sdmp, newapp.exe, 00000008.00000002.927326149.0000000001240000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: list of P.O.exe, 00000001.00000002.927738084.0000000001660000.00000002.00000001.sdmp, newapp.exe, 00000008.00000002.927326149.0000000001240000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: list of P.O.exe, 00000001.00000002.927738084.0000000001660000.00000002.00000001.sdmp, newapp.exe, 00000008.00000002.927326149.0000000001240000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Users\user\Desktop\list of P.O.exe VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Users\user\Desktop\list of P.O.exe VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\list of P.O.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.926206822.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.926206299.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.669608907.00000000033E9000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 6816, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: list of P.O.exe PID: 7156, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 6516, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: list of P.O.exe PID: 6224, type: MEMORY
                Source: Yara matchFile source: 8.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.list of P.O.exe.400000.0.unpack, type: UNPACKEDPE
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\list of P.O.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\list of P.O.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\list of P.O.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\list of P.O.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 6816, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: list of P.O.exe PID: 6224, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.926206822.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.926206299.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.669608907.00000000033E9000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 6816, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: list of P.O.exe PID: 7156, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: newapp.exe PID: 6516, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: list of P.O.exe PID: 6224, type: MEMORY
                Source: Yara matchFile source: 8.2.newapp.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.list of P.O.exe.400000.0.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection112Disable or Modify Tools1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information1Credentials in Registry1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Security Account ManagerSecurity Software Discovery311SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 326337 Sample: list of P.O.exe Startdate: 03/12/2020 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Yara detected AgentTesla 2->43 45 7 other signatures 2->45 6 list of P.O.exe 1 2->6         started        10 newapp.exe 1 2->10         started        12 newapp.exe 2->12         started        process3 file4 21 C:\Users\user\AppData\...\list of P.O.exe.log, ASCII 6->21 dropped 47 Injects a PE file into a foreign processes 6->47 14 list of P.O.exe 2 5 6->14         started        49 Multi AV Scanner detection for dropped file 10->49 51 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->51 53 Machine Learning detection for dropped file 10->53 55 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 10->55 19 newapp.exe 2 10->19         started        signatures5 process6 dnsIp7 27 smtp.sonoscepa.net 14->27 29 us2.smtp.mailhostbox.com 208.91.199.225, 49755, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->29 23 C:\Users\user\AppData\Roaming\...\newapp.exe, PE32 14->23 dropped 25 C:\Users\user\...\newapp.exe:Zone.Identifier, ASCII 14->25 dropped 31 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->31 33 Tries to steal Mail credentials (via file access) 14->33 35 Tries to harvest and steal ftp login credentials 14->35 37 2 other signatures 14->37 file8 signatures9

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                list of P.O.exe100%Joe Sandbox ML

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\newapp\newapp.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\newapp\newapp.exe25%ReversingLabsByteCode-MSIL.Trojan.Wacatac

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                1.2.list of P.O.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                8.2.newapp.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                SourceDetectionScannerLabelLink
                smtp.sonoscepa.net0%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://smtp.sonoscepa.net0%VirustotalBrowse
                http://smtp.sonoscepa.net0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://vkloll.com0%Avira URL Cloudsafe
                https://WMSJ15tuzJ0HQU3MhtVn.org0%Avira URL Cloudsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                us2.smtp.mailhostbox.com
                208.91.199.225
                truefalse
                  high
                  smtp.sonoscepa.net
                  unknown
                  unknowntrueunknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://127.0.0.1:HTTP/1.1list of P.O.exe, 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://DynDns.comDynDNSnewapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://smtp.sonoscepa.netlist of P.O.exe, 00000001.00000002.928767416.000000000307C000.00000004.00000001.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://us2.smtp.mailhostbox.comlist of P.O.exe, 00000001.00000002.928767416.000000000307C000.00000004.00000001.sdmpfalse
                    high
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%halist of P.O.exe, 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot%telegramapi%/list of P.O.exe, 00000000.00000002.669608907.00000000033E9000.00000004.00000001.sdmp, list of P.O.exe, 00000001.00000002.926206822.0000000000402000.00000040.00000001.sdmp, newapp.exe, 00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.926206299.0000000000402000.00000040.00000001.sdmpfalse
                      high
                      https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xlist of P.O.exe, 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziplist of P.O.exe, newapp.exe, 00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmp, newapp.exe, 00000008.00000002.926206299.0000000000402000.00000040.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://vkloll.comnewapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://WMSJ15tuzJ0HQU3MhtVn.orglist of P.O.exe, 00000001.00000002.928802698.0000000003086000.00000004.00000001.sdmp, list of P.O.exe, 00000001.00000002.928753365.0000000003076000.00000004.00000001.sdmp, list of P.O.exe, 00000001.00000002.928675437.000000000303D000.00000004.00000001.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.orgGETMozilla/5.0newapp.exe, 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        208.91.199.225
                        unknownUnited States
                        394695PUBLIC-DOMAIN-REGISTRYUSfalse

                        General Information

                        Joe Sandbox Version:31.0.0 Red Diamond
                        Analysis ID:326337
                        Start date:03.12.2020
                        Start time:10:04:15
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 11m 36s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:list of P.O.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:15
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@7/4@2/1
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 0.5% (good quality ratio 0.5%)
                        • Quality average: 55%
                        • Quality standard deviation: 21.9%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 104.43.193.48, 51.104.139.180, 40.88.32.150, 52.155.217.156, 2.20.142.210, 2.20.142.209, 20.54.26.129, 92.122.213.247, 92.122.213.194, 168.61.161.212
                        • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, a767.dscg3.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        10:05:12API Interceptor805x Sleep call for process: list of P.O.exe modified
                        10:05:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                        10:05:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                        10:05:48API Interceptor538x Sleep call for process: newapp.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        208.91.199.225Scan0202.exeGet hashmaliciousBrowse
                          F9g721I4sS.rtfGet hashmaliciousBrowse
                            Payment advise_pdf__________________________________.exeGet hashmaliciousBrowse
                              New Order.xlsxGet hashmaliciousBrowse
                                Invoice.xlsxGet hashmaliciousBrowse
                                  TT receipt.xlsxGet hashmaliciousBrowse
                                    Payment.exeGet hashmaliciousBrowse
                                      Update Account.exeGet hashmaliciousBrowse
                                        RFQ-272021.exeGet hashmaliciousBrowse
                                          SecuriteInfo.com.BehavesLike.Win32.Generic.bc.exeGet hashmaliciousBrowse
                                            qvI6l0RoMB.exeGet hashmaliciousBrowse
                                              aguerox.exeGet hashmaliciousBrowse
                                                dchampfrndx.exeGet hashmaliciousBrowse
                                                  dchamp.exeGet hashmaliciousBrowse
                                                    New shipment.exeGet hashmaliciousBrowse
                                                      MIC Taiwan RFQ.docGet hashmaliciousBrowse
                                                        SecuriteInfo.com.BackDoor.SpyBotNET.25.28952.exeGet hashmaliciousBrowse
                                                          Inquiry.xlsxGet hashmaliciousBrowse
                                                            Shipping DOC_PDF.exeGet hashmaliciousBrowse
                                                              mcsrXx9lfD.exeGet hashmaliciousBrowse

                                                                Domains

                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                us2.smtp.mailhostbox.comNew Inquiry015 02-12-2020.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143
                                                                New Order Inquiry.PDF.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143
                                                                Salary_PMT.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                Swift Copy.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143
                                                                Scan0202.exeGet hashmaliciousBrowse
                                                                • 208.91.199.225
                                                                F9g721I4sS.rtfGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                Payment advise_pdf__________________________________.exeGet hashmaliciousBrowse
                                                                • 208.91.199.225
                                                                Fagner Order_pdf.exeGet hashmaliciousBrowse
                                                                • 208.91.199.223
                                                                PO-789906504.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                Al Jaber Dubai.exeGet hashmaliciousBrowse
                                                                • 208.91.199.223
                                                                SecuriteInfo.com.Generic.mg.bcffd84bcd9111df.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                SecuriteInfo.com.Generic.mg.db37503e0e66b5c4.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                New Order.xlsxGet hashmaliciousBrowse
                                                                • 208.91.199.225
                                                                vbc.exeGet hashmaliciousBrowse
                                                                • 208.91.199.223
                                                                SecuriteInfo.com.Generic.mg.0944e0c972d02445.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143
                                                                inquiry.xlsxGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                vbc.exeGet hashmaliciousBrowse
                                                                • 208.91.199.223
                                                                Invoice.xlsxGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                Purchase Order 1508521.xlsxGet hashmaliciousBrowse
                                                                • 208.91.199.223
                                                                Purchase Order 1508521.xlsxGet hashmaliciousBrowse
                                                                • 208.91.199.224

                                                                ASN

                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                PUBLIC-DOMAIN-REGISTRYUSNew Inquiry015 02-12-2020.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143
                                                                New Order Inquiry.PDF.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143
                                                                Salary_PMT.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                Swift Copy.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143
                                                                Scan0202.exeGet hashmaliciousBrowse
                                                                • 208.91.199.225
                                                                F9g721I4sS.rtfGet hashmaliciousBrowse
                                                                • 208.91.199.225
                                                                Payment advise_pdf__________________________________.exeGet hashmaliciousBrowse
                                                                • 208.91.199.225
                                                                Fagner Order_pdf.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                PO-789906504.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                Al Jaber Dubai.exeGet hashmaliciousBrowse
                                                                • 208.91.199.223
                                                                AddressValidateForm-490710598-12022020.xlsGet hashmaliciousBrowse
                                                                • 103.195.185.149
                                                                AddressValidateForm-490710598-12022020.xlsGet hashmaliciousBrowse
                                                                • 103.195.185.149
                                                                https://dynalist.io/d/TcKkPvWijzGN4uv-0OCmM26AGet hashmaliciousBrowse
                                                                • 199.79.62.144
                                                                https://www.paperturn-view.com/?pid=MTI128610Get hashmaliciousBrowse
                                                                • 199.79.62.243
                                                                r.dllGet hashmaliciousBrowse
                                                                • 103.53.40.79
                                                                SecuriteInfo.com.Generic.mg.bcffd84bcd9111df.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                SecuriteInfo.com.Generic.mg.db37503e0e66b5c4.exeGet hashmaliciousBrowse
                                                                • 208.91.199.224
                                                                New Order.xlsxGet hashmaliciousBrowse
                                                                • 208.91.199.225
                                                                vbc.exeGet hashmaliciousBrowse
                                                                • 208.91.199.223
                                                                SecuriteInfo.com.Generic.mg.0944e0c972d02445.exeGet hashmaliciousBrowse
                                                                • 208.91.198.143

                                                                JA3 Fingerprints

                                                                No context

                                                                Dropped Files

                                                                No context

                                                                Created / dropped Files

                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\list of P.O.exe.log
                                                                Process:C:\Users\user\Desktop\list of P.O.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):792
                                                                Entropy (8bit):5.331449916613832
                                                                Encrypted:false
                                                                SSDEEP:24:MLKE4K5E4Ks29E4Kx1qE4x84qXKDE4KhK3VZ9pKhk:MuHK5HKX9HKx1qHxviYHKhQnok
                                                                MD5:48C35637F4E5AE32A768BDF159A4B32E
                                                                SHA1:C27B5E37426D6496AF195A39B7882DF50341EE4A
                                                                SHA-256:43567270C0C1C1BCD458595B138034B2A6F6DC4B2DFFA475AE7D629BE4C93BD2
                                                                SHA-512:B4E98A592CC5EDB8E3379283756A01B7712922748BF4FC19E41B1205DD404367C11357BB17824419A2C4B2CE007BEAA55EBA97F602BC5B361EABC222CBC0374D
                                                                Malicious:true
                                                                Reputation:moderate, very likely benign file
                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newapp.exe.log
                                                                Process:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):792
                                                                Entropy (8bit):5.331449916613832
                                                                Encrypted:false
                                                                SSDEEP:24:MLKE4K5E4Ks29E4Kx1qE4x84qXKDE4KhK3VZ9pKhk:MuHK5HKX9HKx1qHxviYHKhQnok
                                                                MD5:48C35637F4E5AE32A768BDF159A4B32E
                                                                SHA1:C27B5E37426D6496AF195A39B7882DF50341EE4A
                                                                SHA-256:43567270C0C1C1BCD458595B138034B2A6F6DC4B2DFFA475AE7D629BE4C93BD2
                                                                SHA-512:B4E98A592CC5EDB8E3379283756A01B7712922748BF4FC19E41B1205DD404367C11357BB17824419A2C4B2CE007BEAA55EBA97F602BC5B361EABC222CBC0374D
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                Process:C:\Users\user\Desktop\list of P.O.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):650752
                                                                Entropy (8bit):6.9475266013442045
                                                                Encrypted:false
                                                                SSDEEP:12288:zBfDf1gZ9WN2qPVGNbTuMuKBD7hpvA2invDMWS40VxaqCwsyt+mwdB5hw7V9nf:zVPST0sDd9eFEAnny0mws7
                                                                MD5:4BC8C3C14CCFE94A9EEA971644F48469
                                                                SHA1:36C93A58DD879A3FC56C38297D05A5BCD89EA7E7
                                                                SHA-256:A2B202778EB54DC48FD49A2F90B7E6619F20C6D0C907D386DA68E9C32FBCB68C
                                                                SHA-512:DEE37A8E367C30A4BAE568D6CCF0B32E21F697B97A631CDA9B0EEA8B90F32DCC1E677EB666F1EB08D26146F68A6B696705C741BB2EBC5CF6E65EBE19D955247D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 25%
                                                                Reputation:low
                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#._..............P.............~.... ... ....@.. .......................`............@.................................,...O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................`.......H........`...i...............8............................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r5..p~....o-...(......t$....+..*Vs....(/...t.........*..(0...*.0..........
                                                                C:\Users\user\AppData\Roaming\newapp\newapp.exe:Zone.Identifier
                                                                Process:C:\Users\user\Desktop\list of P.O.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:true
                                                                Reputation:high, very likely benign file
                                                                Preview: [ZoneTransfer]....ZoneId=0

                                                                Static File Info

                                                                General

                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):6.9475266013442045
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                File name:list of P.O.exe
                                                                File size:650752
                                                                MD5:4bc8c3c14ccfe94a9eea971644f48469
                                                                SHA1:36c93a58dd879a3fc56c38297d05a5bcd89ea7e7
                                                                SHA256:a2b202778eb54dc48fd49a2f90b7e6619f20c6d0c907d386da68e9c32fbcb68c
                                                                SHA512:dee37a8e367c30a4bae568d6ccf0b32e21f697b97a631cda9b0eea8b90f32dcc1e677eb666f1eb08d26146f68a6b696705c741bb2ebc5cf6e65ebe19d955247d
                                                                SSDEEP:12288:zBfDf1gZ9WN2qPVGNbTuMuKBD7hpvA2invDMWS40VxaqCwsyt+mwdB5hw7V9nf:zVPST0sDd9eFEAnny0mws7
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#._..............P.............~.... ... ....@.. .......................`............@................................

                                                                File Icon

                                                                Icon Hash:00828e8e8686b000

                                                                Static PE Info

                                                                General

                                                                Entrypoint:0x4a027e
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                Time Stamp:0x5FC8238A [Wed Dec 2 23:30:18 2020 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:v4.0.30319
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                Entrypoint Preview

                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al

                                                                Data Directories

                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa022c0x4f.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x5dc.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa40000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                Sections

                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x9e2840x9e400False0.703148141291data6.95700056065IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                .rsrc0xa20000x5dc0x600False0.426432291667data4.15897577483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0xa40000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                Resources

                                                                NameRVASizeTypeLanguageCountry
                                                                RT_VERSION0xa20900x34cdata
                                                                RT_MANIFEST0xa23ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                Imports

                                                                DLLImport
                                                                mscoree.dll_CorExeMain

                                                                Version Infos

                                                                DescriptionData
                                                                Translation0x0000 0x04b0
                                                                LegalCopyrightCopyright 2011
                                                                Assembly Version1.0.0.0
                                                                InternalNameDictionaryNode.exe
                                                                FileVersion1.0.0.0
                                                                CompanyName
                                                                LegalTrademarks
                                                                Comments
                                                                ProductNameLoginWindowsApp
                                                                ProductVersion1.0.0.0
                                                                FileDescriptionLoginWindowsApp
                                                                OriginalFilenameDictionaryNode.exe

                                                                Network Behavior

                                                                Snort IDS Alerts

                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                12/03/20-10:06:55.130495TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49755587192.168.2.4208.91.199.225

                                                                Network Port Distribution

                                                                TCP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Dec 3, 2020 10:06:53.541992903 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:53.691517115 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:53.691674948 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:54.209743977 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:54.210197926 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:54.359502077 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:54.359529972 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:54.360852003 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:54.510858059 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:54.511495113 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:54.663302898 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:54.664274931 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:54.814652920 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:54.817707062 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:54.975519896 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:54.975816011 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:55.125483990 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:55.130495071 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:55.130774975 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:55.131490946 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:55.131561995 CET49755587192.168.2.4208.91.199.225
                                                                Dec 3, 2020 10:06:55.280059099 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:55.280772924 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:55.392534018 CET58749755208.91.199.225192.168.2.4
                                                                Dec 3, 2020 10:06:55.446288109 CET49755587192.168.2.4208.91.199.225

                                                                UDP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Dec 3, 2020 10:05:29.946433067 CET4925753192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:29.982129097 CET53492578.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:30.807250977 CET6238953192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:30.834280968 CET53623898.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:31.029256105 CET4991053192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:31.056555033 CET53499108.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:31.601881027 CET5585453192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:31.629007101 CET53558548.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:32.513299942 CET6454953192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:32.540298939 CET53645498.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:51.748588085 CET6315353192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:51.784224033 CET53631538.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:52.485482931 CET5299153192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:52.520925045 CET53529918.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:53.208003998 CET5370053192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:53.245230913 CET53537008.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:53.323091030 CET5172653192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:53.358387947 CET53517268.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:53.913110971 CET5679453192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:53.953476906 CET53567948.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:54.396658897 CET5653453192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:54.492934942 CET53565348.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:54.990587950 CET5662753192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:55.025863886 CET53566278.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:55.533962011 CET5662153192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:55.569493055 CET53566218.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:55.952414989 CET6311653192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:55.995779991 CET53631168.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:56.534075022 CET6407853192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:56.569401026 CET53640788.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:57.281593084 CET6480153192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:57.322081089 CET53648018.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:05:57.756759882 CET6172153192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:05:57.783782005 CET53617218.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:06:10.953772068 CET5125553192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:06:10.990626097 CET53512558.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:06:37.890407085 CET6152253192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:06:37.917579889 CET53615228.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:06:38.953031063 CET5233753192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:06:38.980031967 CET53523378.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:06:43.984344006 CET5504653192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:06:44.011482000 CET53550468.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:06:46.188503981 CET4961253192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:06:46.232362986 CET53496128.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:06:53.194719076 CET4928553192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:06:53.360893965 CET53492858.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:06:53.380086899 CET5060153192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:06:53.415900946 CET53506018.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:07:09.929637909 CET6087553192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:07:09.956590891 CET53608758.8.8.8192.168.2.4
                                                                Dec 3, 2020 10:07:10.742408037 CET5644853192.168.2.48.8.8.8
                                                                Dec 3, 2020 10:07:10.769412041 CET53564488.8.8.8192.168.2.4

                                                                DNS Queries

                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                Dec 3, 2020 10:06:53.194719076 CET192.168.2.48.8.8.80x9cbbStandard query (0)smtp.sonoscepa.netA (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.380086899 CET192.168.2.48.8.8.80x2d80Standard query (0)smtp.sonoscepa.netA (IP address)IN (0x0001)

                                                                DNS Answers

                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                Dec 3, 2020 10:06:53.360893965 CET8.8.8.8192.168.2.40x9cbbNo error (0)smtp.sonoscepa.netus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.360893965 CET8.8.8.8192.168.2.40x9cbbNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.360893965 CET8.8.8.8192.168.2.40x9cbbNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.360893965 CET8.8.8.8192.168.2.40x9cbbNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.360893965 CET8.8.8.8192.168.2.40x9cbbNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.415900946 CET8.8.8.8192.168.2.40x2d80No error (0)smtp.sonoscepa.netus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.415900946 CET8.8.8.8192.168.2.40x2d80No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.415900946 CET8.8.8.8192.168.2.40x2d80No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.415900946 CET8.8.8.8192.168.2.40x2d80No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                Dec 3, 2020 10:06:53.415900946 CET8.8.8.8192.168.2.40x2d80No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)

                                                                SMTP Packets

                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                Dec 3, 2020 10:06:54.209743977 CET58749755208.91.199.225192.168.2.4220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                Dec 3, 2020 10:06:54.210197926 CET49755587192.168.2.4208.91.199.225EHLO 428040
                                                                Dec 3, 2020 10:06:54.359529972 CET58749755208.91.199.225192.168.2.4250-us2.outbound.mailhostbox.com
                                                                250-PIPELINING
                                                                250-SIZE 41648128
                                                                250-VRFY
                                                                250-ETRN
                                                                250-STARTTLS
                                                                250-AUTH PLAIN LOGIN
                                                                250-AUTH=PLAIN LOGIN
                                                                250-ENHANCEDSTATUSCODES
                                                                250-8BITMIME
                                                                250 DSN
                                                                Dec 3, 2020 10:06:54.360852003 CET49755587192.168.2.4208.91.199.225AUTH login YWxleC56aGFuZ0Bzb25vc2NlcGEubmV0
                                                                Dec 3, 2020 10:06:54.510858059 CET58749755208.91.199.225192.168.2.4334 UGFzc3dvcmQ6
                                                                Dec 3, 2020 10:06:54.663302898 CET58749755208.91.199.225192.168.2.4235 2.7.0 Authentication successful
                                                                Dec 3, 2020 10:06:54.664274931 CET49755587192.168.2.4208.91.199.225MAIL FROM:<alex.zhang@sonoscepa.net>
                                                                Dec 3, 2020 10:06:54.814652920 CET58749755208.91.199.225192.168.2.4250 2.1.0 Ok
                                                                Dec 3, 2020 10:06:54.817707062 CET49755587192.168.2.4208.91.199.225RCPT TO:<alex.zhang@sonoscepa.net>
                                                                Dec 3, 2020 10:06:54.975519896 CET58749755208.91.199.225192.168.2.4250 2.1.5 Ok
                                                                Dec 3, 2020 10:06:54.975816011 CET49755587192.168.2.4208.91.199.225DATA
                                                                Dec 3, 2020 10:06:55.125483990 CET58749755208.91.199.225192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                                                Dec 3, 2020 10:06:55.131561995 CET49755587192.168.2.4208.91.199.225.
                                                                Dec 3, 2020 10:06:55.392534018 CET58749755208.91.199.225192.168.2.4250 2.0.0 Ok: queued as DB527D5CFE

                                                                Code Manipulations

                                                                Statistics

                                                                Behavior

                                                                Click to jump to process

                                                                System Behavior

                                                                General

                                                                Start time:10:05:09
                                                                Start date:03/12/2020
                                                                Path:C:\Users\user\Desktop\list of P.O.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\Desktop\list of P.O.exe'
                                                                Imagebase:0x10000
                                                                File size:650752 bytes
                                                                MD5 hash:4BC8C3C14CCFE94A9EEA971644F48469
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.669167585.00000000023E1000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.669608907.00000000033E9000.00000004.00000001.sdmp, Author: Joe Security
                                                                Reputation:low

                                                                General

                                                                Start time:10:05:12
                                                                Start date:03/12/2020
                                                                Path:C:\Users\user\Desktop\list of P.O.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\list of P.O.exe
                                                                Imagebase:0x850000
                                                                File size:650752 bytes
                                                                MD5 hash:4BC8C3C14CCFE94A9EEA971644F48469
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.928152880.0000000002D21000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.926206822.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                Reputation:low

                                                                General

                                                                Start time:10:05:43
                                                                Start date:03/12/2020
                                                                Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\AppData\Roaming\newapp\newapp.exe'
                                                                Imagebase:0x670000
                                                                File size:650752 bytes
                                                                MD5 hash:4BC8C3C14CCFE94A9EEA971644F48469
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.753102125.0000000003B09000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000005.00000002.752268135.0000000002B01000.00000004.00000001.sdmp, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 25%, ReversingLabs
                                                                Reputation:low

                                                                General

                                                                Start time:10:05:49
                                                                Start date:03/12/2020
                                                                Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                Imagebase:0x4d0000
                                                                File size:650752 bytes
                                                                MD5 hash:4BC8C3C14CCFE94A9EEA971644F48469
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.927566603.00000000027D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.926206299.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                Reputation:low

                                                                General

                                                                Start time:10:05:51
                                                                Start date:03/12/2020
                                                                Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\AppData\Roaming\newapp\newapp.exe'
                                                                Imagebase:0xca0000
                                                                File size:650752 bytes
                                                                MD5 hash:4BC8C3C14CCFE94A9EEA971644F48469
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:low

                                                                Disassembly

                                                                Code Analysis

                                                                Reset < >