Loading ...

Play interactive tourEdit tour

Analysis Report Statement of Account.exe

Overview

General Information

Sample Name:Statement of Account.exe
Analysis ID:339079
MD5:8d7144cdca415dbdf39548d460a8866b
SHA1:7a37f9f0728708811235437d69fb74579548f758
SHA256:fa769a960a22d4ce289da152e5535fa6f9e610d8796aeb907bacf3157c1270b5
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Statement of Account.exe (PID: 3980 cmdline: 'C:\Users\user\Desktop\Statement of Account.exe' MD5: 8D7144CDCA415DBDF39548D460A8866B)
    • schtasks.exe (PID: 4640 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 5456 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "yJr2pyY5i7vE9", "URL: ": "http://cV9LNZgDQeR7CK6z.org", "To: ": "sales2@chestronic.com", "ByHost: ": "mail.chestronic.com:587", "Password: ": "d4aqvGyl40aQf", "From: ": "sales2@chestronic.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

              Sigma Overview

              System Summary:

              barindex
              Sigma detected: MSBuild connects to smtp portShow sources
              Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 23.254.244.17, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 5456, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49749
              Sigma detected: Scheduled temp file as task from temp locationShow sources
              Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\Statement of Account.exe' , ParentImage: C:\Users\user\Desktop\Statement of Account.exe, ParentProcessId: 3980, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp', ProcessId: 4640

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: MSBuild.exe.5456.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "yJr2pyY5i7vE9", "URL: ": "http://cV9LNZgDQeR7CK6z.org", "To: ": "sales2@chestronic.com", "ByHost: ": "mail.chestronic.com:587", "Password: ": "d4aqvGyl40aQf", "From: ": "sales2@chestronic.com"}
              Multi AV Scanner detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\eRwRffX.exeReversingLabs: Detection: 11%
              Multi AV Scanner detection for submitted fileShow sources
              Source: Statement of Account.exeVirustotal: Detection: 25%Perma Link
              Source: Statement of Account.exeReversingLabs: Detection: 11%
              Machine Learning detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Roaming\eRwRffX.exeJoe Sandbox ML: detected
              Machine Learning detection for sampleShow sources
              Source: Statement of Account.exeJoe Sandbox ML: detected
              Source: 3.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
              Source: Statement of Account.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: Statement of Account.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: http://cV9LNZgDQeR7CK6z.org
              Source: global trafficTCP traffic: 192.168.2.3:49749 -> 23.254.244.17:587
              Source: Joe Sandbox ViewIP Address: 23.254.244.17 23.254.244.17
              Source: Joe Sandbox ViewASN Name: HOSTWINDSUS HOSTWINDSUS
              Source: global trafficTCP traffic: 192.168.2.3:49749 -> 23.254.244.17:587
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 84.53.167.113
              Source: unknownTCP traffic detected without corresponding DNS query: 2.17.179.193
              Source: unknownTCP traffic detected without corresponding DNS query: 84.53.167.113
              Source: unknownTCP traffic detected without corresponding DNS query: 2.17.179.193
              Source: unknownTCP traffic detected without corresponding DNS query: 2.17.179.193
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 20.190.129.2
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
              Source: unknownTCP traffic detected without corresponding DNS query: 186.64.119.165
              Source: unknownTCP traffic detected without corresponding DNS query: 186.64.119.165
              Source: unknownTCP traffic detected without corresponding DNS query: 186.64.119.165
              Source: unknownDNS traffic detected: queries for: mail.chestronic.com
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: MSBuild.exe, 00000003.00000002.578383711.0000000003691000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.575713024.000000000343C000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.578974533.00000000036FC000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.579011179.0000000003701000.00000004.00000001.sdmpString found in binary or memory: http://cV9LNZgDQeR7CK6z.org
              Source: MSBuild.exe, 00000003.00000002.578692738.00000000036D2000.00000004.00000001.sdmpString found in binary or memory: http://chestronic.com
              Source: MSBuild.exe, 00000003.00000002.578757614.00000000036D8000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: MSBuild.exe, 00000003.00000002.588294433.0000000006600000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: MSBuild.exe, 00000003.00000003.450505714.000000000661F000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
              Source: MSBuild.exe, 00000003.00000002.578757614.00000000036D8000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
              Source: MSBuild.exe, 00000003.00000002.578692738.00000000036D2000.00000004.00000001.sdmpString found in binary or memory: http://mail.chestronic.com
              Source: MSBuild.exe, 00000003.00000003.450505714.000000000661F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: http://sjSmfS.com
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
              Source: Statement of Account.exe, 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
              Source: MSBuild.exe, 00000003.00000002.578757614.00000000036D8000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
              Source: Statement of Account.exe, 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
              Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713

              System Summary:

              barindex
              .NET source code contains very large array initializationsShow sources
              Source: 3.2.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b813AF9DBu002dC4A7u002d4B2Fu002d98F6u002d3508F744762Bu007d/u0037328D8C2u002d20A6u002d4200u002dB595u002d1EBAC5029632.csLarge array initialization: .cctor: array initializer size 11993
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_005E9013
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_05BCDD78
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_05BC0D80
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_05BC2D1A
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_05BC0D73
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_05BC71D0
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_05BC0B28
              Source: C:\Users\user\Desktop\Statement of Account.exeCode function: 0_2_05BC0B18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018A2D50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018A1FE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018A2618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018ABC90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018AB6B2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B4DE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B8148
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B1CA8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018BAF10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B62B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B2228
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B5984
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B15A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B30E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B0006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018B4470
              Source: Statement of Account.exeBinary or memory string: OriginalFilename vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWknSFDcbckSWaOKzgGLUFEXl.exe4 vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.231640208.0000000005080000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.232246201.0000000006330000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.232246201.0000000006330000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.232115938.0000000006230000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.226939426.00000000005E2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSessionInfo.exe@ vs Statement of Account.exe
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs Statement of Account.exe
              Source: Statement of Account.exeBinary or memory string: OriginalFilenameSessionInfo.exe@ vs Statement of Account.exe
              Source: Statement of Account.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 3.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 3.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@4/1
              Source: C:\Users\user\Desktop\Statement of Account.exeFile created: C:\Users\user\AppData\Roaming\eRwRffX.exeJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4272:120:WilError_01
              Source: C:\Users\user\Desktop\Statement of Account.exeMutant created: \Sessions\1\BaseNamedObjects\txcGGIvvQlUaQhzxlSOZtTiNWGi
              Source: C:\Users\user\Desktop\Statement of Account.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBACF.tmpJump to behavior
              Source: Statement of Account.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Statement of Account.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\Statement of Account.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Statement of Account.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: Statement of Account.exeVirustotal: Detection: 25%
              Source: Statement of Account.exeReversingLabs: Detection: 11%
              Source: C:\Users\user\Desktop\Statement of Account.exeFile read: C:\Users\user\Desktop\Statement of Account.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Statement of Account.exe 'C:\Users\user\Desktop\Statement of Account.exe'
              Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp'
              Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp'
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              Source: C:\Users\user\Desktop\Statement of Account.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
              Source: C:\Users\user\Desktop\Statement of Account.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Statement of Account.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Statement of Account.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

              Data Obfuscation:

              barindex
              .NET source code contains potential unpackerShow sources
              Source: Statement of Account.exe, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: eRwRffX.exe.0.dr, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.0.Statement of Account.exe.5e0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.2.Statement of Account.exe.5e0000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_018A7E3F push edi; retn 0000h
              Source: initial sampleStatic PE information: section name: .text entropy: 7.28753546565
              Source: initial sampleStatic PE information: section name: .text entropy: 7.28753546565
              Source: C:\Users\user\Desktop\Statement of Account.exeFile created: C:\Users\user\AppData\Roaming\eRwRffX.exeJump to dropped file

              Boot Survival:

              barindex
              Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
              Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp'
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement of Account.exe PID: 3980, type: MEMORY
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\Statement of Account.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: C:\Users\user\Desktop\Statement of Account.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\Statement of Account.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 6578
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 3280
              Source: C:\Users\user\Desktop\Statement of Account.exe TID: 5704Thread sleep time: -53656s >= -30000s
              Source: C:\Users\user\Desktop\Statement of Account.exe TID: 5500Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\Statement of Account.exe TID: 1968Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4112Thread sleep time: -11068046444225724s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5364Thread sleep count: 6578 > 30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5364Thread sleep count: 3280 > 30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: MSBuild.exe, 00000003.00000002.588194103.0000000006510000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: MSBuild.exe, 00000003.00000002.588194103.0000000006510000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
              Source: MSBuild.exe, 00000003.00000002.588194103.0000000006510000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
              Source: MSBuild.exe, 00000003.00000003.424749334.0000000006619000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Statement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: MSBuild.exe, 00000003.00000002.588194103.0000000006510000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess token adjusted: Debug
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\Statement of Account.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\Statement of Account.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
              Writes to foreign memory regionsShow sources
              Source: C:\Users\user\Desktop\Statement of Account.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
              Source: C:\Users\user\Desktop\Statement of Account.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
              Source: C:\Users\user\Desktop\Statement of Account.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 438000
              Source: C:\Users\user\Desktop\Statement of Account.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43A000
              Source: C:\Users\user\Desktop\Statement of Account.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 137E008
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp'
              Source: C:\Users\user\Desktop\Statement of Account.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              Source: MSBuild.exe, 00000003.00000002.574382068.0000000001D60000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: MSBuild.exe, 00000003.00000002.574382068.0000000001D60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: MSBuild.exe, 00000003.00000002.574382068.0000000001D60000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: MSBuild.exe, 00000003.00000002.574382068.0000000001D60000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\Statement of Account.exeQueries volume information: C:\Users\user\Desktop\Statement of Account.exe VolumeInformation
              Source: C:\Users\user\Desktop\Statement of Account.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\Statement of Account.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\Statement of Account.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\Statement of Account.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\Statement of Account.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5456, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement of Account.exe PID: 3980, type: MEMORY
              Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
              Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Tries to harvest and steal ftp login credentialsShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Yara matchFile source: 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5456, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5456, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Statement of Account.exe PID: 3980, type: MEMORY
              Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection212Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing12NTDSSecurity Software Discovery321Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol112SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsVirtualization/Sandbox Evasion14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion14Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection212DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              Statement of Account.exe25%VirustotalBrowse
              Statement of Account.exe11%ReversingLabsWin32.Trojan.Wacatac
              Statement of Account.exe100%Joe Sandbox ML

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\eRwRffX.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\eRwRffX.exe11%ReversingLabsWin32.Trojan.Wacatac

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              3.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://sjSmfS.com0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              http://chestronic.com0%Avira URL Cloudsafe
              http://cV9LNZgDQeR7CK6z.org0%Avira URL Cloudsafe
              http://mail.chestronic.com0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
              https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
              https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              chestronic.com
              23.254.244.17
              truetrue
                unknown
                mail.chestronic.com
                unknown
                unknowntrue
                  unknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://cV9LNZgDQeR7CK6z.orgtrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                    high
                    http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    https://api.ipify.orgMSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                      high
                      http://DynDns.comDynDNSMSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://sectigo.com/CPS0MSBuild.exe, 00000003.00000002.578757614.00000000036D8000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://sjSmfS.comMSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/bot%telegramapi%/Statement of Account.exe, 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmpfalse
                        high
                        http://chestronic.comMSBuild.exe, 00000003.00000002.578692738.00000000036D2000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://mail.chestronic.comMSBuild.exe, 00000003.00000002.578692738.00000000036D2000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameStatement of Account.exe, 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                          high
                          https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xMSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipStatement of Account.exe, 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://api.ipify.orgGETMozilla/5.0MSBuild.exe, 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            23.254.244.17
                            unknownUnited States
                            54290HOSTWINDSUStrue

                            General Information

                            Joe Sandbox Version:31.0.0 Red Diamond
                            Analysis ID:339079
                            Start date:13.01.2021
                            Start time:13:16:08
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 8m 11s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:Statement of Account.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:33
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@6/5@4/1
                            EGA Information:Failed
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded IPs from analysis (whitelisted): 104.42.151.234, 13.88.21.125, 51.104.139.180, 23.210.248.85, 92.122.213.194, 92.122.213.247, 20.54.26.129, 93.184.221.240, 51.103.5.186, 51.11.168.160, 40.88.32.150, 168.61.161.212, 52.155.217.156
                            • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, wu.azureedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, skypedataprdcoleus15.cloudapp.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, wu.ec.azureedge.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            13:17:06API Interceptor1x Sleep call for process: Statement of Account.exe modified
                            13:17:22API Interceptor1109x Sleep call for process: MSBuild.exe modified

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            23.254.244.174600031748.exeGet hashmaliciousBrowse
                              4600031748.exeGet hashmaliciousBrowse
                                scan copy-001.exeGet hashmaliciousBrowse
                                  SOA.exeGet hashmaliciousBrowse
                                    Transfer Form.exeGet hashmaliciousBrowse
                                      Transfer Form.exeGet hashmaliciousBrowse
                                        SOA.exeGet hashmaliciousBrowse
                                          SOA.exeGet hashmaliciousBrowse
                                            PO.423pdf.exeGet hashmaliciousBrowse
                                              PO.423pdf.exeGet hashmaliciousBrowse
                                                032021CITAR.exeGet hashmaliciousBrowse
                                                  AGROMAR#U00a0PROFORMA.exeGet hashmaliciousBrowse
                                                    AGROMAR#U00a0PROFORMA.exeGet hashmaliciousBrowse
                                                      SOA.exeGet hashmaliciousBrowse
                                                        Hydraulex.exeGet hashmaliciousBrowse

                                                          Domains

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                                          ASN

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          HOSTWINDSUS4600031748.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          1gEpBw4A95.exeGet hashmaliciousBrowse
                                                          • 23.254.224.2
                                                          4600031748.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          scan copy-001.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          SOA.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          Z8363664.docGet hashmaliciousBrowse
                                                          • 104.168.154.203
                                                          Transfer Form.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          Transfer Form.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          jfuoevj.exeGet hashmaliciousBrowse
                                                          • 192.119.111.137
                                                          SOA.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          SOA.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          zsmcirs.exeGet hashmaliciousBrowse
                                                          • 192.119.111.137
                                                          REP er0005147.docGet hashmaliciousBrowse
                                                          • 104.168.154.203
                                                          PO.423pdf.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          PO.423pdf.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          032021CITAR.exeGet hashmaliciousBrowse
                                                          • 23.254.244.17
                                                          http://chr-cssnf.ga/?login=doGet hashmaliciousBrowse
                                                          • 104.168.136.235
                                                          utr63q.vbsGet hashmaliciousBrowse
                                                          • 104.168.204.195
                                                          NaTdOM3rA7.exeGet hashmaliciousBrowse
                                                          • 198.44.97.180
                                                          k8Jw01YX3c.exeGet hashmaliciousBrowse
                                                          • 192.119.110.12

                                                          JA3 Fingerprints

                                                          No context

                                                          Dropped Files

                                                          No context

                                                          Created / dropped Files

                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Statement of Account.exe.log
                                                          Process:C:\Users\user\Desktop\Statement of Account.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.355304211458859
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                          MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                          SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                          SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                          SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                          Malicious:true
                                                          Reputation:moderate, very likely benign file
                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                          C:\Users\user\AppData\Local\Temp\tmpBACF.tmp
                                                          Process:C:\Users\user\Desktop\Statement of Account.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1640
                                                          Entropy (8bit):5.186147810066712
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBltn:cbh47TlNQ//rydbz9I3YODOLNdq3Z
                                                          MD5:007C0FA4B0C756852145C60F6E025A6D
                                                          SHA1:AD817895DFBD7C83F762C14C328DB07FDAF66301
                                                          SHA-256:CB6D3D6C38C318AFE9F3E4A9565132F3A7DB86BA8F1978A873A596B1A62E6649
                                                          SHA-512:C7AE152687F473E84F10122C7615794D59AE258ADCC4D2B209760FF86189EEDD7AF55EDE3856648BA80D3779EAD772DD6A2606FEB50B457C80311AE9F8DBBC11
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                          C:\Users\user\AppData\Roaming\eRwRffX.exe
                                                          Process:C:\Users\user\Desktop\Statement of Account.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):827392
                                                          Entropy (8bit):7.28144235904361
                                                          Encrypted:false
                                                          SSDEEP:12288:cRQgp43cnZDfBQjFX9rfFHzM3bRwjLYPBoER6Ddm:A4sZLBQjd3zM3aYpo3Jm
                                                          MD5:8D7144CDCA415DBDF39548D460A8866B
                                                          SHA1:7A37F9F0728708811235437D69FB74579548F758
                                                          SHA-256:FA769A960A22D4CE289DA152E5535FA6F9E610D8796AEB907BACF3157C1270B5
                                                          SHA-512:955AE6FCD4BD5F77A5EA376FBBF7827315BAF73BDFCEFB5F519944398DCB700EA9F22218176624D89F0FD523FF34DCCCCAD4139E1C8E6142D1F295E0F67498F0
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 11%
                                                          Reputation:low
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....._..............P.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......<X...............................................................(....*&..(.....*.s ........s!........s"........s#........s$........*...0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*&..(*....*...0..<........~.....(+.....,!r...p.....(,...o-...s.............~.....+..*.0...........~.....+..*".......*.0...........(....r=..p~....o/....+..*...0..<........~.....(+.....,!rG..p.....(,
                                                          C:\Users\user\AppData\Roaming\eRwRffX.exe:Zone.Identifier
                                                          Process:C:\Users\user\Desktop\Statement of Account.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview: [ZoneTransfer]....ZoneId=0
                                                          C:\Users\user\AppData\Roaming\sh0vu41c.d1k\Chrome\Default\Cookies
                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                          Category:dropped
                                                          Size (bytes):20480
                                                          Entropy (8bit):0.6970840431455908
                                                          Encrypted:false
                                                          SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                                          MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                                          SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                                          SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                                          SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.28144235904361
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Windows Screen Saver (13104/52) 0.07%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          File name:Statement of Account.exe
                                                          File size:827392
                                                          MD5:8d7144cdca415dbdf39548d460a8866b
                                                          SHA1:7a37f9f0728708811235437d69fb74579548f758
                                                          SHA256:fa769a960a22d4ce289da152e5535fa6f9e610d8796aeb907bacf3157c1270b5
                                                          SHA512:955ae6fcd4bd5f77a5ea376fbbf7827315baf73bdfcefb5f519944398dcb700ea9f22218176624d89f0fd523ff34dccccad4139e1c8e6142d1f295e0f67498f0
                                                          SSDEEP:12288:cRQgp43cnZDfBQjFX9rfFHzM3bRwjLYPBoER6Ddm:A4sZLBQjd3zM3aYpo3Jm
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P.................. ........@.. ....................................@................................

                                                          File Icon

                                                          Icon Hash:00828e8e8686b000

                                                          Static PE Info

                                                          General

                                                          Entrypoint:0x4cb40e
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x5FFEB9F0 [Wed Jan 13 09:14:24 2021 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:v4.0.30319
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                          Entrypoint Preview

                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al

                                                          Data Directories

                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xcb3bc0x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x5cc.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                          Sections

                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000xc94140xc9600False0.691340782123data7.28753546565IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .rsrc0xcc0000x5cc0x600False0.419270833333data4.11955969192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xce0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                          Resources

                                                          NameRVASizeTypeLanguageCountry
                                                          RT_VERSION0xcc0900x33cdata
                                                          RT_MANIFEST0xcc3dc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                          Imports

                                                          DLLImport
                                                          mscoree.dll_CorExeMain

                                                          Version Infos

                                                          DescriptionData
                                                          Translation0x0000 0x04b0
                                                          LegalCopyrightCopyright 2011
                                                          Assembly Version1.0.0.0
                                                          InternalNameSessionInfo.exe
                                                          FileVersion1.0.0.0
                                                          CompanyName
                                                          LegalTrademarks
                                                          Comments
                                                          ProductNameFileReplacement
                                                          ProductVersion1.0.0.0
                                                          FileDescriptionFileReplacement
                                                          OriginalFilenameSessionInfo.exe

                                                          Network Behavior

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 13, 2021 13:17:22.329139948 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.332210064 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.344530106 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.392551899 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.406025887 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.406214952 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.406900883 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.424411058 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.470793009 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.470844984 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.470884085 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.470906973 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.470921040 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.471004009 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.475728989 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.536870003 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.536914110 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.536952019 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.536983967 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.537019968 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.537056923 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.537074089 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.537096024 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.537137032 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.537151098 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.537184000 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.537223101 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.537247896 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.537739038 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.538515091 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.538587093 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.600013971 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.600058079 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747093916 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747150898 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747188091 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747246027 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.747263908 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747303009 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747317076 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.747339964 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747378111 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747387886 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.747414112 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747459888 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:17:22.747476101 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.759885073 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:22.822376966 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:17:43.929927111 CET804968093.184.220.29192.168.2.3
                                                          Jan 13, 2021 13:17:43.930327892 CET4968080192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:17:44.043482065 CET4968380192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:17:44.083384037 CET804968393.184.220.29192.168.2.3
                                                          Jan 13, 2021 13:17:44.083514929 CET4968380192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:17:44.590485096 CET4968980192.168.2.384.53.167.113
                                                          Jan 13, 2021 13:17:44.590569973 CET49688443192.168.2.32.17.179.193
                                                          Jan 13, 2021 13:17:44.630980015 CET804968984.53.167.113192.168.2.3
                                                          Jan 13, 2021 13:17:44.631040096 CET443496882.17.179.193192.168.2.3
                                                          Jan 13, 2021 13:17:44.631072998 CET443496882.17.179.193192.168.2.3
                                                          Jan 13, 2021 13:17:44.631072998 CET4968980192.168.2.384.53.167.113
                                                          Jan 13, 2021 13:17:44.631131887 CET49688443192.168.2.32.17.179.193
                                                          Jan 13, 2021 13:17:44.631175041 CET49688443192.168.2.32.17.179.193
                                                          Jan 13, 2021 13:17:46.267443895 CET49696443192.168.2.323.210.249.50
                                                          Jan 13, 2021 13:17:46.267637014 CET4969780192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:17:46.280858040 CET804969293.184.220.29192.168.2.3
                                                          Jan 13, 2021 13:17:46.281016111 CET4969280192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:17:48.646560907 CET49707443192.168.2.3204.79.197.200
                                                          Jan 13, 2021 13:17:48.646626949 CET49708443192.168.2.3204.79.197.200
                                                          Jan 13, 2021 13:18:33.203876019 CET4968080192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:18:33.203952074 CET49698443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:18:33.235389948 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:18:33.235456944 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:18:33.244103909 CET804968093.184.220.29192.168.2.3
                                                          Jan 13, 2021 13:18:33.244350910 CET4968080192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:18:33.265650988 CET4434969820.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:18:33.265834093 CET49698443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:18:33.295329094 CET4434969320.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:18:33.295591116 CET49693443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:18:33.296845913 CET4434971420.190.129.2192.168.2.3
                                                          Jan 13, 2021 13:18:33.297058105 CET49714443192.168.2.320.190.129.2
                                                          Jan 13, 2021 13:18:47.720607042 CET804969293.184.220.29192.168.2.3
                                                          Jan 13, 2021 13:18:47.720715046 CET4969280192.168.2.393.184.220.29
                                                          Jan 13, 2021 13:18:49.084397078 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:49.261193991 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:49.261331081 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:49.629069090 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:49.629375935 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:49.800765991 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:49.801074982 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:49.978652954 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:50.032744884 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:50.041479111 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:50.226382017 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:50.226447105 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:50.226488113 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:50.226519108 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:50.226517916 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:50.226571083 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:50.230479956 CET5874974923.254.244.17192.168.2.3
                                                          Jan 13, 2021 13:18:50.259190083 CET49749587192.168.2.323.254.244.17
                                                          Jan 13, 2021 13:18:50.433252096 CET5874974923.254.244.17192.168.2.3

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 13, 2021 13:17:15.235147953 CET6015253192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:15.283096075 CET53601528.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:17.794472933 CET5754453192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:17.851032972 CET53575448.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:21.795707941 CET5598453192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:21.846538067 CET53559848.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:23.372314930 CET6418553192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:23.420351982 CET53641858.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:25.096415997 CET6511053192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:25.144617081 CET53651108.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:25.713126898 CET5836153192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:25.769495964 CET53583618.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:26.364336967 CET6349253192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:26.415071964 CET53634928.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:29.223328114 CET6083153192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:29.284353018 CET53608318.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:36.062458992 CET6010053192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:36.113209963 CET53601008.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:38.070696115 CET5319553192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:38.118870974 CET53531958.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:39.373505116 CET5014153192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:39.424463034 CET53501418.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:39.559889078 CET5302353192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:39.624552011 CET53530238.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:40.635224104 CET4956353192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:40.683197975 CET53495638.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:41.903990984 CET5135253192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:41.952049971 CET53513528.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:44.475142002 CET5934953192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:44.531775951 CET53593498.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:45.342811108 CET5708453192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:45.434134007 CET53570848.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:47.258168936 CET5882353192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:47.306293964 CET53588238.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:50.283185005 CET5756853192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:50.339901924 CET53575688.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:52.749754906 CET5054053192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:52.800834894 CET53505408.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:57.024214983 CET5436653192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:57.072196007 CET53543668.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:17:57.860409975 CET5303453192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:17:57.908476114 CET53530348.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:22.762449980 CET5776253192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:22.810399055 CET53577628.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:23.612066984 CET5543553192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:23.660207987 CET53554358.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:24.486335039 CET5071353192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:24.537156105 CET53507138.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:24.968077898 CET5613253192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:25.042423010 CET53561328.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:25.404375076 CET5898753192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:25.452408075 CET53589878.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:26.290127039 CET5657953192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:26.338430882 CET53565798.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:48.603116035 CET6063353192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:48.785650015 CET53606338.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:48.798002005 CET6129253192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:48.829895020 CET6361953192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:48.877932072 CET53636198.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:48.983237982 CET53612928.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:53.368350983 CET6493853192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:53.424547911 CET53649388.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:18:53.433990955 CET6194653192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:18:53.495500088 CET53619468.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:42.402489901 CET6491053192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:42.459256887 CET53649108.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:43.190722942 CET5212353192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:43.249910116 CET53521238.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:44.091826916 CET5613053192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:44.144438028 CET53561308.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:44.714895010 CET5633853192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:44.763113976 CET53563388.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:45.374547005 CET5942053192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:45.431186914 CET53594208.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:46.206428051 CET5878453192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:46.264622927 CET53587848.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:46.855021954 CET6397853192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:46.902925968 CET53639788.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:48.015754938 CET6293853192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:48.066567898 CET53629388.8.8.8192.168.2.3
                                                          Jan 13, 2021 13:19:48.738970041 CET5570853192.168.2.38.8.8.8
                                                          Jan 13, 2021 13:19:48.786906004 CET53557088.8.8.8192.168.2.3

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Jan 13, 2021 13:18:48.603116035 CET192.168.2.38.8.8.80xabe6Standard query (0)mail.chestronic.comA (IP address)IN (0x0001)
                                                          Jan 13, 2021 13:18:48.798002005 CET192.168.2.38.8.8.80xf37Standard query (0)mail.chestronic.comA (IP address)IN (0x0001)
                                                          Jan 13, 2021 13:18:53.368350983 CET192.168.2.38.8.8.80x924dStandard query (0)mail.chestronic.comA (IP address)IN (0x0001)
                                                          Jan 13, 2021 13:18:53.433990955 CET192.168.2.38.8.8.80x1b24Standard query (0)mail.chestronic.comA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Jan 13, 2021 13:18:48.785650015 CET8.8.8.8192.168.2.30xabe6No error (0)mail.chestronic.comchestronic.comCNAME (Canonical name)IN (0x0001)
                                                          Jan 13, 2021 13:18:48.785650015 CET8.8.8.8192.168.2.30xabe6No error (0)chestronic.com23.254.244.17A (IP address)IN (0x0001)
                                                          Jan 13, 2021 13:18:48.983237982 CET8.8.8.8192.168.2.30xf37No error (0)mail.chestronic.comchestronic.comCNAME (Canonical name)IN (0x0001)
                                                          Jan 13, 2021 13:18:48.983237982 CET8.8.8.8192.168.2.30xf37No error (0)chestronic.com23.254.244.17A (IP address)IN (0x0001)
                                                          Jan 13, 2021 13:18:53.424547911 CET8.8.8.8192.168.2.30x924dNo error (0)mail.chestronic.comchestronic.comCNAME (Canonical name)IN (0x0001)
                                                          Jan 13, 2021 13:18:53.424547911 CET8.8.8.8192.168.2.30x924dNo error (0)chestronic.com23.254.244.17A (IP address)IN (0x0001)
                                                          Jan 13, 2021 13:18:53.495500088 CET8.8.8.8192.168.2.30x1b24No error (0)mail.chestronic.comchestronic.comCNAME (Canonical name)IN (0x0001)
                                                          Jan 13, 2021 13:18:53.495500088 CET8.8.8.8192.168.2.30x1b24No error (0)chestronic.com23.254.244.17A (IP address)IN (0x0001)

                                                          SMTP Packets

                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                          Jan 13, 2021 13:18:49.629069090 CET5874974923.254.244.17192.168.2.3220-dal-shared-36.hostwindsdns.com ESMTP Exim 4.93 #2 Wed, 13 Jan 2021 04:18:49 -0800
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Jan 13, 2021 13:18:49.629375935 CET49749587192.168.2.323.254.244.17EHLO 124406
                                                          Jan 13, 2021 13:18:49.800765991 CET5874974923.254.244.17192.168.2.3250-dal-shared-36.hostwindsdns.com Hello 124406 [84.17.52.74]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-STARTTLS
                                                          250 HELP
                                                          Jan 13, 2021 13:18:49.801074982 CET49749587192.168.2.323.254.244.17STARTTLS
                                                          Jan 13, 2021 13:18:49.978652954 CET5874974923.254.244.17192.168.2.3220 TLS go ahead
                                                          Jan 13, 2021 13:18:53.852014065 CET5874975023.254.244.17192.168.2.3220-dal-shared-36.hostwindsdns.com ESMTP Exim 4.93 #2 Wed, 13 Jan 2021 04:18:53 -0800
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Jan 13, 2021 13:18:53.852494001 CET49750587192.168.2.323.254.244.17EHLO 124406
                                                          Jan 13, 2021 13:18:54.028196096 CET5874975023.254.244.17192.168.2.3250-dal-shared-36.hostwindsdns.com Hello 124406 [84.17.52.74]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-STARTTLS
                                                          250 HELP
                                                          Jan 13, 2021 13:18:54.028923035 CET49750587192.168.2.323.254.244.17STARTTLS
                                                          Jan 13, 2021 13:18:54.207133055 CET5874975023.254.244.17192.168.2.3220 TLS go ahead

                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:13:17:00
                                                          Start date:13/01/2021
                                                          Path:C:\Users\user\Desktop\Statement of Account.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\Statement of Account.exe'
                                                          Imagebase:0x5e0000
                                                          File size:827392 bytes
                                                          MD5 hash:8D7144CDCA415DBDF39548D460A8866B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.230197757.0000000003B5F000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.227700296.0000000002B01000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:13:17:07
                                                          Start date:13/01/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\eRwRffX' /XML 'C:\Users\user\AppData\Local\Temp\tmpBACF.tmp'
                                                          Imagebase:0x330000
                                                          File size:185856 bytes
                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:13:17:07
                                                          Start date:13/01/2021
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6b2800000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:13:17:08
                                                          Start date:13/01/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          Imagebase:0x7ff7488e0000
                                                          File size:261728 bytes
                                                          MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.575561117.0000000003401000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.570956453.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          Reputation:moderate

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >