Loading ...

Play interactive tourEdit tour

Analysis Report JUST1F1.tar

Overview

General Information

Sample Name:JUST1F1.tar
Analysis ID:338154
MD5:68bfcb37e51bc06b0f9b776ad69c9575
SHA1:11f8c44f9c1d466def73c75149a661aa2cf71dfd
SHA256:d23f969ae26972088e1ec2c404edfb95add9b3a67be616fedd1ee0fef7cba287

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • unarchiver.exe (PID: 5780 cmdline: 'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\Desktop\JUST1F1.tar' MD5: 8B435F8731563566F3F49203BA277865)
    • 7za.exe (PID: 6104 cmdline: 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg' 'C:\Users\user\Desktop\JUST1F1.tar' MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
      • conhost.exe (PID: 5576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 2856 cmdline: 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • JUST1F1.exe (PID: 6840 cmdline: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe MD5: 1B05FB33C53270DB133E7E7830CDA935)
        • JUST1F1.exe (PID: 6516 cmdline: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe MD5: 1B05FB33C53270DB133E7E7830CDA935)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "uhV8VNpzP", "URL: ": "http://RmfrFmh6Ec0Y1.com", "To: ": "", "ByHost: ": "smtp.1and1.es:587", "Password: ": "Cxvu3Va", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.675383386.0000000004481000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000002.989247161.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            6.2.JUST1F1.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: JUST1F1.exe.6516.6.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "uhV8VNpzP", "URL: ": "http://RmfrFmh6Ec0Y1.com", "To: ": "", "ByHost: ": "smtp.1and1.es:587", "Password: ": "Cxvu3Va", "From: ": ""}
              Machine Learning detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeJoe Sandbox ML: detected
              Source: 6.2.JUST1F1.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
              Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
              Source: Binary string: mscorrc.pdb source: JUST1F1.exe, 00000005.00000002.676091893.0000000005710000.00000002.00000001.sdmp, JUST1F1.exe, 00000006.00000002.989933486.0000000001500000.00000002.00000001.sdmp
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 4x nop then jmp 0181097Fh
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 4x nop then jmp 0181097Eh
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 4x nop then jmp 0181097Eh
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: http://RmfrFmh6Ec0Y1.com
              Source: global trafficTCP traffic: 192.168.2.4:49774 -> 212.227.15.142:587
              Source: Joe Sandbox ViewIP Address: 212.227.15.142 212.227.15.142
              Source: global trafficTCP traffic: 192.168.2.4:49774 -> 212.227.15.142:587
              Source: unknownDNS traffic detected: queries for: smtp.1and1.es
              Source: JUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: JUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: JUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpString found in binary or memory: http://RmfrFmh6Ec0Y1.com
              Source: JUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpString found in binary or memory: http://RmfrFmh6Ec0Y1.comLE
              Source: JUST1F1.exe, 00000006.00000002.990692781.000000000345C000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.geotrust.com/GeoTrustRSACA2018.crt0
              Source: JUST1F1.exe, 00000006.00000002.990692781.000000000345C000.00000004.00000001.sdmpString found in binary or memory: http://cdp.geotrust.com/GeoTrustRSACA2018.crl0L
              Source: JUST1F1.exe, 00000006.00000002.990692781.000000000345C000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: JUST1F1.exe, 00000006.00000002.990692781.000000000345C000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0B
              Source: JUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpString found in binary or memory: http://qphjuU.com
              Source: JUST1F1.exe, 00000006.00000002.990692781.000000000345C000.00000004.00000001.sdmpString found in binary or memory: http://status.geotrust.com0=
              Source: JUST1F1.exe, 00000006.00000002.990692781.000000000345C000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
              Source: JUST1F1.exe, 00000005.00000002.675383386.0000000004481000.00000004.00000001.sdmp, JUST1F1.exe, 00000006.00000002.989247161.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: JUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
              Source: unarchiver.exe, 00000000.00000002.677946184.0000000001400000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary:

              barindex
              .NET source code contains very large array initializationsShow sources
              Source: 6.2.JUST1F1.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b1A82A344u002d7631u002d4D01u002dB6C2u002d4D7CCC0A813Cu007d/u0032382CB16u002d27B1u002d493Au002dA31Cu002d9967CBD8A2C7.csLarge array initialization: .cctor: array initializer size 11927
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 0_2_018102A8
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 0_2_01810299
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_013228A4
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_01336484
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA1074
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FAA608
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA5BF2
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA17B0
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA17A0
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA1478
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA1468
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA4C50
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA844B
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA4C40
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_015D1D00
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_0543E138
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_0543D9E0
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_0543B7A0
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05438C40
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05430A98
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05438BE0
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05DDE9C8
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05DD91B0
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05DDCDA4
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05DDE570
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05DD3F11
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_05DD5A10
              Source: JUST1F1.tarBinary or memory string: OriginalFilenameUIPermissionClipboard.exe* vs JUST1F1.tar
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeSection loaded: security.dll
              Source: 6.2.JUST1F1.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 6.2.JUST1F1.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winTAR@11/4@1/1
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\JUST1F1.exe.logJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5576:120:WilError_01
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:864:120:WilError_01
              Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\4uifd5lh.jpuJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
              Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
              Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: unknownProcess created: C:\Windows\SysWOW64\unarchiver.exe 'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\Desktop\JUST1F1.tar'
              Source: unknownProcess created: C:\Windows\SysWOW64\7za.exe 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg' 'C:\Users\user\Desktop\JUST1F1.tar'
              Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe'
              Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg' 'C:\Users\user\Desktop\JUST1F1.tar'
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess created: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
              Source: Binary string: mscorrc.pdb source: JUST1F1.exe, 00000005.00000002.676091893.0000000005710000.00000002.00000001.sdmp, JUST1F1.exe, 00000006.00000002.989933486.0000000001500000.00000002.00000001.sdmp

              Data Obfuscation:

              barindex
              Binary contains a suspicious time stampShow sources
              Source: initial sampleStatic PE information: 0xC023C5A7 [Wed Feb 24 20:03:51 2072 UTC]
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_0133840C push ecx; ret
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_02FA9E64 push 02FAh; iretd
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_0543BB38 pushfd ; ret
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_0543CCF8 push esp; iretd
              Source: initial sampleStatic PE information: section name: .text entropy: 7.38023666029
              Source: C:\Windows\SysWOW64\7za.exeFile created: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: JUST1F1.exe PID: 6840, type: MEMORY
              Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFunction Chain: memAlloc,systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,systemQueried,memAlloc,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: JUST1F1.exe, 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: JUST1F1.exe, 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Windows\SysWOW64\unarchiver.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeWindow / User API: threadDelayed 877
              Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5704Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 6364Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 6824Thread sleep time: -50650s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 6388Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 7000Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 7000Thread sleep count: 877 > 30
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 7000Thread sleep time: -26310000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 7000Thread sleep time: -30000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe TID: 7000Thread sleep time: -30000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 0_2_013DB042 GetSystemInfo,
              Source: JUST1F1.exe, 00000006.00000002.989813861.0000000001248000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllSUY6
              Source: JUST1F1.exe, 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: JUST1F1.exe, 00000006.00000002.992224555.0000000005640000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
              Source: JUST1F1.exe, 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: JUST1F1.exe, 00000006.00000002.992224555.0000000005640000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
              Source: JUST1F1.exe, 00000006.00000002.992224555.0000000005640000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
              Source: JUST1F1.exe, 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
              Source: JUST1F1.exe, 00000006.00000002.989795749.0000000001225000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW"
              Source: JUST1F1.exe, 00000005.00000002.674029983.000000000140B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: JUST1F1.exe, 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: JUST1F1.exe, 00000006.00000002.992224555.0000000005640000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 6_2_0543BD08 LdrInitializeThunk,
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess token adjusted: Debug
              Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeMemory written: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe base: 400000 value starts with: 4D5A
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg' 'C:\Users\user\Desktop\JUST1F1.tar'
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeProcess created: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
              Source: JUST1F1.exe, 00000006.00000002.990020762.0000000001990000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: JUST1F1.exe, 00000006.00000002.990020762.0000000001990000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: JUST1F1.exe, 00000006.00000002.990020762.0000000001990000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: JUST1F1.exe, 00000006.00000002.990020762.0000000001990000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.675383386.0000000004481000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.989247161.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: JUST1F1.exe PID: 6840, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: JUST1F1.exe PID: 6516, type: MEMORY
              Source: Yara matchFile source: 6.2.JUST1F1.exe.400000.0.unpack, type: UNPACKEDPE
              Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Tries to harvest and steal ftp login credentialsShow sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Yara matchFile source: 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: JUST1F1.exe PID: 6516, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.675383386.0000000004481000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.989247161.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: JUST1F1.exe PID: 6840, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: JUST1F1.exe PID: 6516, type: MEMORY
              Source: Yara matchFile source: 6.2.JUST1F1.exe.400000.0.unpack, type: UNPACKEDPE
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_03020A8E listen,
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_03020E9E bind,
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_03020A50 CreateMutexW,listen,
              Source: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exeCode function: 5_2_03020E6B bind,

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools11OS Credential Dumping2System Information Discovery115Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1Input Capture1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Credentials in Registry1Security Software Discovery211SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing2NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol111SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection112/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 338154 Sample: JUST1F1.tar Startdate: 11/01/2021 Architecture: WINDOWS Score: 100 30 Found malware configuration 2->30 32 Yara detected AgentTesla 2->32 34 Yara detected AntiVM_3 2->34 36 4 other signatures 2->36 8 unarchiver.exe 5 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 7za.exe 2 8->12         started        file5 15 JUST1F1.exe 5 10->15         started        18 conhost.exe 10->18         started        26 C:\Users\user\AppData\Local\...\JUST1F1.exe, PE32 12->26 dropped 20 conhost.exe 12->20         started        process6 signatures7 46 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->46 48 Machine Learning detection for dropped file 15->48 50 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->50 52 2 other signatures 15->52 22 JUST1F1.exe 4 15->22         started        process8 dnsIp9 28 smtp.1and1.es 212.227.15.142, 49774, 587 ONEANDONE-ASBrauerstrasse48DE Germany 22->28 38 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->38 40 Tries to steal Mail credentials (via file access) 22->40 42 Tries to harvest and steal ftp login credentials 22->42 44 Tries to harvest and steal browser information (history, passwords, etc) 22->44 signatures10

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              No Antivirus matches

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe100%Joe Sandbox ML

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              6.2.JUST1F1.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://qphjuU.com0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              http://RmfrFmh6Ec0Y1.com0%Avira URL Cloudsafe
              http://RmfrFmh6Ec0Y1.comLE0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              smtp.1and1.es
              212.227.15.142
              truefalse
                high

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://RmfrFmh6Ec0Y1.comtrue
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1JUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSJUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://qphjuU.comJUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haJUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://RmfrFmh6Ec0Y1.comLEJUST1F1.exe, 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipJUST1F1.exe, 00000005.00000002.675383386.0000000004481000.00000004.00000001.sdmp, JUST1F1.exe, 00000006.00000002.989247161.0000000000402000.00000040.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                212.227.15.142
                unknownGermany
                8560ONEANDONE-ASBrauerstrasse48DEfalse

                General Information

                Joe Sandbox Version:31.0.0 Red Diamond
                Analysis ID:338154
                Start date:11.01.2021
                Start time:18:19:09
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 28s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:JUST1F1.tar
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:21
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winTAR@11/4@1/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 0.1% (good quality ratio 0%)
                • Quality average: 0%
                • Quality standard deviation: 0%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .tar
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 40.88.32.150, 104.43.139.144, 51.104.139.180, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129, 67.27.157.126, 67.26.83.254, 67.26.73.254, 8.248.117.254, 8.248.115.254
                • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, au-bg-shim.trafficmanager.net
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                18:20:07API Interceptor1234x Sleep call for process: JUST1F1.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                212.227.15.142Fizetesi felszolitas.tarGet hashmaliciousBrowse
                  Orden de pago BBVA.exeGet hashmaliciousBrowse
                    PAP001.exeGet hashmaliciousBrowse
                      Paketdetails.exeGet hashmaliciousBrowse
                        PAG0.exeGet hashmaliciousBrowse
                          b6Sq4e2cn7.exeGet hashmaliciousBrowse
                            h41lD1yljY.exeGet hashmaliciousBrowse
                              CHBhXBQny7.exeGet hashmaliciousBrowse
                                V796UGDxjs.exeGet hashmaliciousBrowse
                                  http://www.mediafire.com/file/f28ppsxzjuy1xsb/UPSRO+2809203321.7z/fileGet hashmaliciousBrowse
                                    https://www.mediafire.com/file/que9zdctac0t9w8/Cerere_de_achizitie.7z/fileGet hashmaliciousBrowse
                                      Eyl#U00fcl Al#U0131m#U0131.exeGet hashmaliciousBrowse
                                        Urun Detaylari.exeGet hashmaliciousBrowse
                                          Olaganustu odeme.exeGet hashmaliciousBrowse

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            smtp.1and1.esFizetesi felszolitas.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            Fizetesi felszolitas.tarGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            Orden de pago BBVA.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            P0.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            RtjTx7D1TN.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            Odeme talimati.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            PAP001.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            Paketdetails.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            71220 33922.tarGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            71220 33922.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            71220 33922.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            PAG0.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            bTe4j4LGwM.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            25BWkjzJzs.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            b6Sq4e2cn7.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            TRANS11.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            h41lD1yljY.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            tHI1XuJZbs.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            CHBhXBQny7.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            ERteds4p1u.exeGet hashmaliciousBrowse
                                            • 212.227.15.158

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            ONEANDONE-ASBrauerstrasse48DEFizetesi felszolitas.exeGet hashmaliciousBrowse
                                            • 212.227.15.158
                                            Fizetesi felszolitas.tarGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            Orden de pago BBVA.exeGet hashmaliciousBrowse
                                            • 212.227.15.142
                                            details.htmlGet hashmaliciousBrowse
                                            • 195.20.250.196
                                            Scan_23748991000.exeGet hashmaliciousBrowse
                                            • 74.208.5.15
                                            rtgs_pdf.exeGet hashmaliciousBrowse
                                            • 217.160.0.163
                                            details.htmlGet hashmaliciousBrowse
                                            • 195.20.250.196
                                            Nuevo pedido.exeGet hashmaliciousBrowse
                                            • 217.160.0.168
                                            https://veringer.com/wp-includes/wwii11/GXQb6HLGz4AV965RfN9795cyETWfmdzBUarzFg4YkqaJnfdTD/Get hashmaliciousBrowse
                                            • 217.76.132.244
                                            r8a97.exeGet hashmaliciousBrowse
                                            • 82.165.152.127
                                            Nuevo pedido.exeGet hashmaliciousBrowse
                                            • 217.160.0.168
                                            KI2011-2982..exeGet hashmaliciousBrowse
                                            • 74.208.5.15
                                            Documentation__EG382U8V.docGet hashmaliciousBrowse
                                            • 217.160.0.215
                                            Documentation__EG382U8V.docGet hashmaliciousBrowse
                                            • 217.160.0.215
                                            Documentation__EG382U8V.docGet hashmaliciousBrowse
                                            • 217.160.0.215
                                            https://j.mp/3rJBANnGet hashmaliciousBrowse
                                            • 74.208.236.92
                                            http://murari.es/wp-content/hGet hashmaliciousBrowse
                                            • 217.76.142.236
                                            rib.exeGet hashmaliciousBrowse
                                            • 74.208.236.219
                                            xLH4kwOjXR.exeGet hashmaliciousBrowse
                                            • 82.165.103.72
                                            order FTH2004-005.exeGet hashmaliciousBrowse
                                            • 217.160.0.163

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\JUST1F1.exe.log
                                            Process:C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):916
                                            Entropy (8bit):5.282390836641403
                                            Encrypted:false
                                            SSDEEP:24:MLF20NaL3z2p29hJ5g522rW2xAi3AP26K95rKoO2+g2+:MwLLD2Y9h3go2rxxAcAO6ox+g2+
                                            MD5:5AD8E7ABEADADAC4CE06FF693476581A
                                            SHA1:81E42A97BBE3D7DE8B1E8B54C2B03C48594D761E
                                            SHA-256:BAA1A28262BA27D51C3A1FA7FB0811AD1128297ABB2EDCCC785DC52667D2A6FD
                                            SHA-512:7793E78E84AD36CE65B5B1C015364E340FB9110FAF199BC0234108CE9BCB1AEDACBD25C6A012AC99740E08BEA5E5C373A88E553E47016304D8AE6AEEAB58EBFF
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..
                                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\unarchiver.exe.log
                                            Process:C:\Windows\SysWOW64\unarchiver.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):388
                                            Entropy (8bit):5.2529463157768355
                                            Encrypted:false
                                            SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk7v:MLF20NaL329hJ5g522r0
                                            MD5:FF3B761A021930205BEC9D7664AE9258
                                            SHA1:1039D595C6333358D5F7EE5619FE6794E6F5FDB1
                                            SHA-256:A3517BC4B1E6470905F9A38466318B302186496E8706F1976F1ED76F3E87AF0F
                                            SHA-512:1E77D09CF965575EF9800B1EE8947A02D98F88DBFA267300330860757A0C7350AF857A2CB7001C49AFF1F5BD1E0AE6E90F643B27054522CADC730DD14BC3DE11
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..
                                            C:\Users\user\AppData\Local\Temp\4uifd5lh.jpu\unarchiver.log
                                            Process:C:\Windows\SysWOW64\unarchiver.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1560
                                            Entropy (8bit):5.059587217820517
                                            Encrypted:false
                                            SSDEEP:48:LNlxgGcGbcGcGpqG37GcGpvmGbmGqmG0G7GrG7GcGBGcGrGPghW:LNlE5Qap
                                            MD5:824CDF1B4684C4CF1BEC917679BAF98A
                                            SHA1:D184864005E8304628B5949F990A1F3DD5AA369F
                                            SHA-256:4481B92210DAE130EE619D13A22481114F0068197A59FE1C3D1846ED6935CA69
                                            SHA-512:4EC38C0F96032E36712777FF4AC161BFF7492FA5B02109436EBF845FED48F5D1BBFEB32C1B1260DD3B76144CC5218CADDE7AD37946AD43EFB381594CE4851DC6
                                            Malicious:false
                                            Reputation:low
                                            Preview: 01/11/2021 6:19 PM: Unpack: C:\Users\user\Desktop\JUST1F1.tar..01/11/2021 6:19 PM: Tmp dir: C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg..01/11/2021 6:19 PM: Received from standard out: ..01/11/2021 6:19 PM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..01/11/2021 6:19 PM: Received from standard out: ..01/11/2021 6:19 PM: Received from standard out: Scanning the drive for archives:..01/11/2021 6:19 PM: Received from standard out: 1 file, 911872 bytes (891 KiB)..01/11/2021 6:19 PM: Received from standard out: ..01/11/2021 6:19 PM: Received from standard out: Extracting archive: C:\Users\user\Desktop\JUST1F1.tar..01/11/2021 6:19 PM: Received from standard out: --..01/11/2021 6:19 PM: Received from standard out: Path = C:\Users\user\Desktop\JUST1F1.tar..01/11/2021 6:19 PM: Received from standard out: Type = tar..01/11/2021 6:19 PM: Received from standard out: Physical Size = 911872..01/11/2021 6:19 PM: Received from standard out: He
                                            C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
                                            Process:C:\Windows\SysWOW64\7za.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):910336
                                            Entropy (8bit):7.409563180880888
                                            Encrypted:false
                                            SSDEEP:12288:dG9cmhhfemqz0BNY+bbYYa40blz56HRkVHsxiqqcCoPN/NOAJcEAKImNdY:w9cUQSml9SRkOxi7cCmXcExNO
                                            MD5:1B05FB33C53270DB133E7E7830CDA935
                                            SHA1:87DA85A3BA7369E684C4120F2329F09BB86CDAC2
                                            SHA-256:4339850F60524D4FC4E157D7CDF156400DB803219CAC6D9768CED6BE90925089
                                            SHA-512:CD25D29E9D27F627E28C75260D0834331D24B63DF70AC8CF48455B25D164D111FB7590CCE5D1ECEE334C65EDE80159F5077A433E59867D368D85C199CD1D554D
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            Reputation:low
                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....#...............P..F...........e... ........@.. .......................@............@..................................e..O.......p.................... ......de............................................... ............... ..H............text....E... ...F.................. ..`.rsrc...p............H..............@..@.reloc....... ......................@..B.................e......H........W...............q...............................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*&..(2....*...0..<........~.....(3.....,!r...p.....(4...o5...s6............~.....

                                            Static File Info

                                            General

                                            File type:tar archive
                                            Entropy (8bit):7.403765894301429
                                            TrID:
                                              File name:JUST1F1.tar
                                              File size:911872
                                              MD5:68bfcb37e51bc06b0f9b776ad69c9575
                                              SHA1:11f8c44f9c1d466def73c75149a661aa2cf71dfd
                                              SHA256:d23f969ae26972088e1ec2c404edfb95add9b3a67be616fedd1ee0fef7cba287
                                              SHA512:56f42eff4ccbf2ff98115b4f550330c869f60c29b3a875b77d46b839b210ec5d458b8872c908a1fc2497ccffa646f31c2f62ae193f8e64b34e4c98be479bc6dc
                                              SSDEEP:12288:hG9cmhhfemqz0BNY+bbYYa40blz56HRkVHsxiqqcCoPN/NOAJcEAKImNdY:E9cUQSml9SRkOxi7cCmXcExNO
                                              File Content Preview:JUST1F1.exe.........................................................................................0000755.0000000.0000000.00003362000.13776772021.0006350.0..................................................................................................

                                              File Icon

                                              Icon Hash:00828e8e8686b000

                                              Network Behavior

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 11, 2021 18:21:41.031100988 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.077652931 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.077934980 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.126873970 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.127340078 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.173743963 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.173787117 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.174185991 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.221072912 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.273782015 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.283530951 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.332076073 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.332127094 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.332159996 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.332247019 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.336798906 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.338429928 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.383433104 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.383656979 CET49774587192.168.2.4212.227.15.142
                                              Jan 11, 2021 18:21:41.384968042 CET58749774212.227.15.142192.168.2.4
                                              Jan 11, 2021 18:21:41.385193110 CET49774587192.168.2.4212.227.15.142

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 11, 2021 18:19:53.576391935 CET4991053192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:53.624532938 CET53499108.8.8.8192.168.2.4
                                              Jan 11, 2021 18:19:54.360508919 CET5585453192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:54.408507109 CET53558548.8.8.8192.168.2.4
                                              Jan 11, 2021 18:19:55.196389914 CET6454953192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:55.244462013 CET53645498.8.8.8192.168.2.4
                                              Jan 11, 2021 18:19:56.216443062 CET6315353192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:56.264246941 CET53631538.8.8.8192.168.2.4
                                              Jan 11, 2021 18:19:57.198611021 CET5299153192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:57.246454000 CET53529918.8.8.8192.168.2.4
                                              Jan 11, 2021 18:19:58.011183023 CET5370053192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:58.067666054 CET53537008.8.8.8192.168.2.4
                                              Jan 11, 2021 18:19:58.818234921 CET5172653192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:58.874752045 CET53517268.8.8.8192.168.2.4
                                              Jan 11, 2021 18:19:59.698775053 CET5679453192.168.2.48.8.8.8
                                              Jan 11, 2021 18:19:59.746836901 CET53567948.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:00.689452887 CET5653453192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:00.737524986 CET53565348.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:01.667010069 CET5662753192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:01.718202114 CET53566278.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:02.429788113 CET5662153192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:02.480901957 CET53566218.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:03.408637047 CET6311653192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:03.457479000 CET53631168.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:18.306932926 CET6407853192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:18.357745886 CET53640788.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:21.521223068 CET6480153192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:21.596088886 CET53648018.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:35.791552067 CET6172153192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:35.868052006 CET53617218.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:36.415021896 CET5125553192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:36.465821981 CET53512558.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:37.034991980 CET6152253192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:37.096507072 CET53615228.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:37.500098944 CET5233753192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:37.628593922 CET53523378.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:37.673626900 CET5504653192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:37.745455980 CET53550468.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:38.076317072 CET4961253192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:38.132837057 CET53496128.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:38.651369095 CET4928553192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:38.707897902 CET53492858.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:39.245394945 CET5060153192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:39.296252012 CET53506018.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:40.020983934 CET6087553192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:40.080224991 CET53608758.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:40.840991974 CET5644853192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:40.889153004 CET53564488.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:41.338118076 CET5917253192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:41.397372961 CET53591728.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:43.018860102 CET6242053192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:43.066968918 CET53624208.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:53.537053108 CET6057953192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:53.585367918 CET53605798.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:53.592798948 CET5018353192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:53.649717093 CET53501838.8.8.8192.168.2.4
                                              Jan 11, 2021 18:20:56.472029924 CET6153153192.168.2.48.8.8.8
                                              Jan 11, 2021 18:20:56.532886982 CET53615318.8.8.8192.168.2.4
                                              Jan 11, 2021 18:21:27.536237001 CET4922853192.168.2.48.8.8.8
                                              Jan 11, 2021 18:21:27.587044954 CET53492288.8.8.8192.168.2.4
                                              Jan 11, 2021 18:21:29.377300024 CET5979453192.168.2.48.8.8.8
                                              Jan 11, 2021 18:21:29.441731930 CET53597948.8.8.8192.168.2.4
                                              Jan 11, 2021 18:21:40.953511953 CET5591653192.168.2.48.8.8.8
                                              Jan 11, 2021 18:21:41.011940956 CET53559168.8.8.8192.168.2.4

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Jan 11, 2021 18:21:40.953511953 CET192.168.2.48.8.8.80x2d38Standard query (0)smtp.1and1.esA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Jan 11, 2021 18:21:41.011940956 CET8.8.8.8192.168.2.40x2d38No error (0)smtp.1and1.es212.227.15.142A (IP address)IN (0x0001)
                                              Jan 11, 2021 18:21:41.011940956 CET8.8.8.8192.168.2.40x2d38No error (0)smtp.1and1.es212.227.15.158A (IP address)IN (0x0001)

                                              SMTP Packets

                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Jan 11, 2021 18:21:41.126873970 CET58749774212.227.15.142192.168.2.4220 kundenserver.de (mreue011) Nemesis ESMTP Service ready
                                              Jan 11, 2021 18:21:41.127340078 CET49774587192.168.2.4212.227.15.142EHLO 910646
                                              Jan 11, 2021 18:21:41.173787117 CET58749774212.227.15.142192.168.2.4250-kundenserver.de Hello 910646 [84.17.52.74]
                                              250-8BITMIME
                                              250-AUTH LOGIN PLAIN
                                              250-SIZE 140000000
                                              250 STARTTLS
                                              Jan 11, 2021 18:21:41.174185991 CET49774587192.168.2.4212.227.15.142STARTTLS
                                              Jan 11, 2021 18:21:41.221072912 CET58749774212.227.15.142192.168.2.4220 OK

                                              Code Manipulations

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:18:19:57
                                              Start date:11/01/2021
                                              Path:C:\Windows\SysWOW64\unarchiver.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\Desktop\JUST1F1.tar'
                                              Imagebase:0xe00000
                                              File size:10240 bytes
                                              MD5 hash:8B435F8731563566F3F49203BA277865
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Reputation:moderate

                                              General

                                              Start time:18:19:57
                                              Start date:11/01/2021
                                              Path:C:\Windows\SysWOW64\7za.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg' 'C:\Users\user\Desktop\JUST1F1.tar'
                                              Imagebase:0x50000
                                              File size:289792 bytes
                                              MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:18:19:58
                                              Start date:11/01/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff724c50000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:18:19:58
                                              Start date:11/01/2021
                                              Path:C:\Windows\SysWOW64\cmd.exe
                                              Wow64 process (32bit):true
                                              Commandline:'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe'
                                              Imagebase:0x11d0000
                                              File size:232960 bytes
                                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:18:19:59
                                              Start date:11/01/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff724c50000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:18:19:59
                                              Start date:11/01/2021
                                              Path:C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
                                              Imagebase:0xc50000
                                              File size:910336 bytes
                                              MD5 hash:1B05FB33C53270DB133E7E7830CDA935
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.675383386.0000000004481000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000005.00000002.674621864.0000000003481000.00000004.00000001.sdmp, Author: Joe Security
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              Reputation:low

                                              General

                                              Start time:18:20:08
                                              Start date:11/01/2021
                                              Path:C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Local\Temp\jwzcmshk.kmg\JUST1F1.exe
                                              Imagebase:0xa50000
                                              File size:910336 bytes
                                              MD5 hash:1B05FB33C53270DB133E7E7830CDA935
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.990481761.0000000003331000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.989247161.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              Disassembly

                                              Code Analysis

                                              Reset < >