Loading ...

Play interactive tourEdit tour

Analysis Report PO13132021.scr

Overview

General Information

Sample Name:PO13132021.scr (renamed file extension from scr to exe)
Analysis ID:344901
MD5:7c4c3a12f367dcd154accce5948ebaeb
SHA1:b0a7b80ddd9b86a20d3a41e3423cedb341b6220c
SHA256:1a1e74fbe89bed37913351432c163e204018655e51811aabb9e5fc6a06cf5887
Tags:AgentTesla

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains strange resources
Potential key logger detected (key state polling based)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • PO13132021.exe (PID: 6960 cmdline: 'C:\Users\user\Desktop\PO13132021.exe' MD5: 7C4C3A12F367DCD154ACCCE5948EBAEB)
    • ioqwel.exe (PID: 6996 cmdline: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s MD5: C56B5F0201A3B3DE53E561FE76912BFD)
      • tpiyon2.exe (PID: 7028 cmdline: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s MD5: 535DD1329AEF11BF4654B3270F026D5B)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "q8yz7CCwgQfF", "URL: ": "http://8fEo7xWGmGml.org", "To: ": "", "ByHost: ": "polar.argondns.net:587", "Password: ": "dKUidybLVbHYBgI", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.587931278.0000000003E01000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.213456226.00000000032F0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.583608219.0000000000CA6000.00000004.00000020.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.582750259.0000000000400000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.583897205.0000000002812000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.tpiyon2.exe.2810000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.ioqwel.exe.32f0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.tpiyon2.exe.27d0000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.1.tpiyon2.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    2.2.tpiyon2.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: tpiyon2.exe.7028.2.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "q8yz7CCwgQfF", "URL: ": "http://8fEo7xWGmGml.org", "To: ": "", "ByHost: ": "polar.argondns.net:587", "Password: ": "dKUidybLVbHYBgI", "From: ": ""}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeReversingLabs: Detection: 20%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PO13132021.exeVirustotal: Detection: 27%Perma Link
                      Source: PO13132021.exeReversingLabs: Detection: 28%
                      Machine Learning detection for sampleShow sources
                      Source: PO13132021.exeJoe Sandbox ML: detected
                      Source: 2.2.tpiyon2.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.1.tpiyon2.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.tpiyon2.exe.2810000.3.unpackAvira: Label: TR/Spy.Gen8

                      Compliance:

                      barindex
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeUnpacked PE file: 2.2.tpiyon2.exe.2810000.3.unpack
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeUnpacked PE file: 2.2.tpiyon2.exe.400000.0.unpack
                      Uses 32bit PE filesShow sources
                      Source: PO13132021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Uses new MSVCR DllsShow sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                      Source: PO13132021.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Binary contains paths to debug symbolsShow sources
                      Source: Binary string: wntdll.pdbUGP source: ioqwel.exe, 00000001.00000003.208763622.00000000046A0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: ioqwel.exe, 00000001.00000003.208763622.00000000046A0000.00000004.00000001.sdmp
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_004059F0 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_0040659C FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_004027A1 FindFirstFileA,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B1494A GetFileAttributesW,FindFirstFileW,FindClose,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00404A29 FindFirstFileExW,

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorURLs: http://8fEo7xWGmGml.org
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.22:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.62:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.53:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.54:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.52:587
                      Source: Joe Sandbox ViewASN Name: NCONNECT-ASRU NCONNECT-ASRU
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.22:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.62:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.53:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.54:587
                      Source: global trafficTCP traffic: 192.168.2.3:49743 -> 91.210.107.52:587
                      Source: unknownDNS traffic detected: queries for: polar.argondns.net
                      Source: tpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: tpiyon2.exe, 00000002.00000002.587885686.00000000032E3000.00000004.00000001.sdmpString found in binary or memory: http://8fEo7xWGmGml.org
                      Source: tpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
                      Source: PO13132021.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                      Source: PO13132021.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000000.202042794.0000000000B79000.00000002.00020000.sdmp, tpiyon2.exe, 00000002.00000000.205351945.00000000004C9000.00000002.00020000.sdmp, ioqwel.exe.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
                      Source: tpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpString found in binary or memory: http://zztVNZ.com
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                      Source: ioqwel.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/06
                      Source: ioqwel.exe, 00000001.00000002.213456226.00000000032F0000.00000004.00000001.sdmp, tpiyon2.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: tpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_0040548D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AB2714 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B3D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.2.tpiyon2.exe.2810000.3.unpack, u003cPrivateImplementationDetailsu003eu007b193D09A3u002dA1F0u002d4601u002d919Eu002d60E0731A697Du007d/u00388ACD12Au002dB5FCu002d48CAu002d9E59u002d054271CF5702.csLarge array initialization: .cctor: array initializer size 11931
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00A7B136 NtQuerySystemInformation,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00A7B105 NtQuerySystemInformation,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B091CF GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_00403461 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_00406925
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AB1663
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AD78C3
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ABB020
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE89BF
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE6A74
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ADDBA5
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC0BE0
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AB9C80
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AB94E0
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE9CE5
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ADF409
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B38400
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ACD45D
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ACDD28
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE6502
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ADCD51
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ABF6A0
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AD16B4
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ABE6F0
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ACF628
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE265E
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE6FE6
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ADBFD6
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_0040A2A5
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00495808
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00490CD0
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00491958
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00491110
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00497618
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00493EA0
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_0049F3E0
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00499BE6
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00495FF8
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00A72477
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe B31445FC4B8803D1B7122A6563002CFE3E925FFD1FDC9B84FBA6FC78F6A8B955
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: String function: 00AD8B30 appears 37 times
                      Source: ioqwel.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: ioqwel.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: ioqwel.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: ioqwel.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: ioqwel.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: ioqwel.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: tpiyon2.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: tpiyon2.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: tpiyon2.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: tpiyon2.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: tpiyon2.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: tpiyon2.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs PO13132021.exe
                      Source: PO13132021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: 2.2.tpiyon2.exe.2810000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.tpiyon2.exe.2810000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/5@1/5
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B1A6AD GetLastError,FormatMessageW,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_00403461 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B09399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B08DE9 AdjustTokenPrivileges,CloseHandle,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00A7AFBA AdjustTokenPrivileges,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00A7AF83 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_0040473E GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B14148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B19ED8 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Users\user\Desktop\PO13132021.exeFile created: C:\Users\user\AppData\Local\Temp\nstBE1F.tmpJump to behavior
                      Source: PO13132021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO13132021.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO13132021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PO13132021.exeVirustotal: Detection: 27%
                      Source: PO13132021.exeReversingLabs: Detection: 28%
                      Source: C:\Users\user\Desktop\PO13132021.exeFile read: C:\Users\user\Desktop\PO13132021.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\PO13132021.exe 'C:\Users\user\Desktop\PO13132021.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                      Source: C:\Users\user\Desktop\PO13132021.exeProcess created: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeProcess created: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                      Source: C:\Users\user\Desktop\PO13132021.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: PO13132021.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: wntdll.pdbUGP source: ioqwel.exe, 00000001.00000003.208763622.00000000046A0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: ioqwel.exe, 00000001.00000003.208763622.00000000046A0000.00000004.00000001.sdmp

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeUnpacked PE file: 2.2.tpiyon2.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.gfids:R;.rsrc:R;
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeUnpacked PE file: 2.2.tpiyon2.exe.2810000.3.unpack
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeUnpacked PE file: 2.2.tpiyon2.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC4BAA LoadLibraryA,GetProcAddress,
                      Source: PO13132021.exeStatic PE information: real checksum: 0x0 should be: 0xbd82c
                      Source: tpiyon2.exe.1.drStatic PE information: real checksum: 0xdf890 should be: 0xe835e
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AD8B75 push ecx; ret
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00401F16 push ecx; ret
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_0049885A push ss; retf
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00E40AD3 push ss; ret
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00E40A09 push ss; ret
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00E407AE push 00000018h; ret
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00E40986 push ss; ret
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00E40923 push ss; ret
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeFile created: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeJump to dropped file
                      Source: C:\Users\user\Desktop\PO13132021.exeFile created: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,KiUserCallbackDispatcher,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\PO13132021.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFunction Chain: memAlloc,memAlloc,systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,systemQueried,processQueried,processQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,systemQueried
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\PO13132021.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeWindow / User API: threadDelayed 608
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe TID: 4696Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe TID: 4696Thread sleep count: 608 > 30
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe TID: 4696Thread sleep time: -18240000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe TID: 720Thread sleep count: 69 > 30
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe TID: 720Thread sleep time: -34500s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe TID: 4696Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe TID: 4696Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_004059F0 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_0040659C FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_004027A1 FindFirstFileA,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B1494A GetFileAttributesW,FindFirstFileW,FindClose,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00404A29 FindFirstFileExW,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,
                      Source: tpiyon2.exe, 00000002.00000002.588247880.00000000055B0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: tpiyon2.exe, 00000002.00000002.588247880.00000000055B0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: tpiyon2.exe, 00000002.00000002.588247880.00000000055B0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: tpiyon2.exe, 00000002.00000002.583713952.0000000000D56000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: tpiyon2.exe, 00000002.00000002.588247880.00000000055B0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00498408 LdrInitializeThunk,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE5CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC4BAA LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_004035F1 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B088CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ADA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00ADA354 SetUnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00401E1D SetUnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeCode function: 2_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeSection loaded: unknown target: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe protection: execute and read and write
                      Sample uses process hollowing techniqueShow sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeSection unmapped: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe base address: 400000
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B09369 LogonUserW,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AC5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,KiUserCallbackDispatcher,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeProcess created: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B088CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00B14F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,
                      Source: PO13132021.exe, 00000000.00000002.217222596.00000000028D2000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214809265.0000000004545000.00000004.00000001.sdmp, tpiyon2.exe, 00000002.00000000.205331022.00000000004B6000.00000002.00020000.sdmp, ioqwel.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                      Source: tpiyon2.exe, 00000002.00000002.583752944.0000000001200000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: ioqwel.exe, tpiyon2.exe, 00000002.00000002.583752944.0000000001200000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: tpiyon2.exe, 00000002.00000002.583752944.0000000001200000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: tpiyon2.exe, 00000002.00000002.583752944.0000000001200000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AD885B cpuid
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE50B7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeCode function: 1_2_00AE416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,
                      Source: C:\Users\user\Desktop\PO13132021.exeCode function: 0_2_00403461 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.587931278.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.213456226.00000000032F0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.583608219.0000000000CA6000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.582750259.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.583897205.0000000002812000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000001.209476830.0000000000414000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.583855776.00000000027D0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tpiyon2.exe PID: 7028, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ioqwel.exe PID: 6996, type: MEMORY
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.2810000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.ioqwel.exe.32f0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.27d0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.tpiyon2.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.ioqwel.exe.32f0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.27d0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tpiyon2.exe PID: 7028, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.587931278.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.213456226.00000000032F0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.583608219.0000000000CA6000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.582750259.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.583897205.0000000002812000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000001.209476830.0000000000414000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.583855776.00000000027D0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tpiyon2.exe PID: 7028, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ioqwel.exe PID: 6996, type: MEMORY
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.2810000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.ioqwel.exe.32f0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.27d0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.tpiyon2.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.ioqwel.exe.32f0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.27d0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.tpiyon2.exe.400000.0.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2Windows Management Instrumentation211Valid Accounts2Exploitation for Privilege Escalation1Disable or Modify Tools11OS Credential Dumping2System Time Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                      Default AccountsNative API11Boot or Logon Initialization ScriptsValid Accounts2Deobfuscate/Decode Files or Information11Input Capture21File and Directory Discovery2Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsShared Modules1Logon Script (Windows)Access Token Manipulation21Obfuscated Files or Information2Credentials in Registry1System Information Discovery128SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Process Injection212Software Packing31NTDSQuery Registry1Distributed Component Object ModelInput Capture21Scheduled TransferApplication Layer Protocol111SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptValid Accounts2LSA SecretsSecurity Software Discovery251SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion14Cached Domain CredentialsVirtualization/Sandbox Evasion14VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation21DCSyncProcess Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemApplication Window Discovery11Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PO13132021.exe27%VirustotalBrowse
                      PO13132021.exe28%ReversingLabsWin32.Trojan.Generic
                      PO13132021.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe5%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe21%ReversingLabsWin32.PUA.Wacapew

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.2.tpiyon2.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      2.1.tpiyon2.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      0.2.PO13132021.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
                      2.2.tpiyon2.exe.2810000.3.unpack100%AviraTR/Spy.Gen8Download File
                      0.0.PO13132021.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      polar.argondns.net0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://8fEo7xWGmGml.org0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://zztVNZ.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      polar.argondns.net
                      91.210.107.22
                      truetrueunknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://8fEo7xWGmGml.orgtrue
                      • Avira URL Cloud: safe
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.autoitscript.com/autoit3/JPO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000000.202042794.0000000000B79000.00000002.00020000.sdmp, tpiyon2.exe, 00000002.00000000.205351945.00000000004C9000.00000002.00020000.sdmp, ioqwel.exe.0.drfalse
                        high
                        http://127.0.0.1:HTTP/1.1tpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNStpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://nsis.sf.net/NSIS_ErrorPO13132021.exefalse
                          high
                          http://nsis.sf.net/NSIS_ErrorErrorPO13132021.exefalse
                            high
                            https://www.autoitscript.com/autoit3/PO13132021.exe, 00000000.00000002.217235174.00000000028E0000.00000004.00000001.sdmp, ioqwel.exe, 00000001.00000002.214822872.0000000004553000.00000004.00000001.sdmp, ioqwel.exe.0.drfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hatpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://zztVNZ.comtpiyon2.exe, 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipioqwel.exe, 00000001.00000002.213456226.00000000032F0000.00000004.00000001.sdmp, tpiyon2.exefalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              91.210.107.22
                              unknownRussian Federation
                              49335NCONNECT-ASRUtrue
                              91.210.107.54
                              unknownRussian Federation
                              49335NCONNECT-ASRUfalse
                              91.210.107.62
                              unknownRussian Federation
                              49335NCONNECT-ASRUfalse
                              91.210.107.53
                              unknownRussian Federation
                              49335NCONNECT-ASRUfalse
                              91.210.107.52
                              unknownRussian Federation
                              49335NCONNECT-ASRUfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:344901
                              Start date:27.01.2021
                              Start time:12:32:48
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 1s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:PO13132021.scr (renamed file extension from scr to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:26
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@5/5@1/5
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 26.5% (good quality ratio 24.8%)
                              • Quality average: 79.3%
                              • Quality standard deviation: 29.6%
                              HCA Information:
                              • Successful, ratio: 58%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 13.64.90.137, 51.11.168.160, 23.210.248.85, 20.54.26.129, 95.101.27.142, 95.101.27.163, 51.103.5.186, 95.101.22.216, 95.101.22.224, 51.104.139.180, 52.155.217.156
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              12:33:46API Interceptor1017x Sleep call for process: tpiyon2.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              91.210.107.22haitianx.exeGet hashmaliciousBrowse
                                pPKwe2k3h8.exeGet hashmaliciousBrowse
                                  POn#U00b0 08312020xlx.exeGet hashmaliciousBrowse
                                    91.210.107.54haitianx.exeGet hashmaliciousBrowse
                                      pPKwe2k3h8.exeGet hashmaliciousBrowse
                                        91.210.107.62haitianx.exeGet hashmaliciousBrowse
                                          91.210.107.53haitianx.exeGet hashmaliciousBrowse
                                            pPKwe2k3h8.exeGet hashmaliciousBrowse
                                              New Order Feb.,2021.docGet hashmaliciousBrowse
                                                91.210.107.52nFEmhKJpQ3.exeGet hashmaliciousBrowse
                                                  wamoH1JlFE.exeGet hashmaliciousBrowse

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    polar.argondns.nethaitianx.exeGet hashmaliciousBrowse
                                                    • 91.210.107.22
                                                    pPKwe2k3h8.exeGet hashmaliciousBrowse
                                                    • 91.210.107.22
                                                    New Order Feb.,2021.docGet hashmaliciousBrowse
                                                    • 91.210.107.62
                                                    nFEmhKJpQ3.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    wamoH1JlFE.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    POn#U00b0 08312020xlx.exeGet hashmaliciousBrowse
                                                    • 91.210.107.22

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    NCONNECT-ASRUhaitianx.exeGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    pPKwe2k3h8.exeGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    New Order Feb.,2021.docGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    nFEmhKJpQ3.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    wamoH1JlFE.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    2019-06-12-malware-EXE-from-80.85.155.70.exeGet hashmaliciousBrowse
                                                    • 80.85.155.70
                                                    Ca4fOzoNzJ.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    elOHMq4FF0.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    z4Bx3C0Q50.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    SecuriteInfo.com.Downloader-FBZCB076D449C2FA.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    SecuriteInfo.com.ArtemisE88E9DC9AD1C.exeGet hashmaliciousBrowse
                                                    • 185.70.107.72
                                                    o2TVmUuQ2r.exeGet hashmaliciousBrowse
                                                    • 185.70.107.73
                                                    Zh3jpW08zI.exeGet hashmaliciousBrowse
                                                    • 185.70.107.40
                                                    OKtLV4rzIP.exeGet hashmaliciousBrowse
                                                    • 185.70.107.72
                                                    3L42ZG9T7d.exeGet hashmaliciousBrowse
                                                    • 185.70.107.35
                                                    http://www.datacentervision.com/Get hashmaliciousBrowse
                                                    • 185.130.215.154
                                                    osi.exeGet hashmaliciousBrowse
                                                    • 158.255.6.242
                                                    qXpkpxFw.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    1nk3VTFB.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    W2WcN9LK.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    NCONNECT-ASRUhaitianx.exeGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    pPKwe2k3h8.exeGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    New Order Feb.,2021.docGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    nFEmhKJpQ3.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    wamoH1JlFE.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    2019-06-12-malware-EXE-from-80.85.155.70.exeGet hashmaliciousBrowse
                                                    • 80.85.155.70
                                                    Ca4fOzoNzJ.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    elOHMq4FF0.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    z4Bx3C0Q50.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    SecuriteInfo.com.Downloader-FBZCB076D449C2FA.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    SecuriteInfo.com.ArtemisE88E9DC9AD1C.exeGet hashmaliciousBrowse
                                                    • 185.70.107.72
                                                    o2TVmUuQ2r.exeGet hashmaliciousBrowse
                                                    • 185.70.107.73
                                                    Zh3jpW08zI.exeGet hashmaliciousBrowse
                                                    • 185.70.107.40
                                                    OKtLV4rzIP.exeGet hashmaliciousBrowse
                                                    • 185.70.107.72
                                                    3L42ZG9T7d.exeGet hashmaliciousBrowse
                                                    • 185.70.107.35
                                                    http://www.datacentervision.com/Get hashmaliciousBrowse
                                                    • 185.130.215.154
                                                    osi.exeGet hashmaliciousBrowse
                                                    • 158.255.6.242
                                                    qXpkpxFw.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    1nk3VTFB.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    W2WcN9LK.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    NCONNECT-ASRUhaitianx.exeGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    pPKwe2k3h8.exeGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    New Order Feb.,2021.docGet hashmaliciousBrowse
                                                    • 91.210.107.53
                                                    nFEmhKJpQ3.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    wamoH1JlFE.exeGet hashmaliciousBrowse
                                                    • 91.210.107.52
                                                    2019-06-12-malware-EXE-from-80.85.155.70.exeGet hashmaliciousBrowse
                                                    • 80.85.155.70
                                                    Ca4fOzoNzJ.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    elOHMq4FF0.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    z4Bx3C0Q50.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    SecuriteInfo.com.Downloader-FBZCB076D449C2FA.exeGet hashmaliciousBrowse
                                                    • 94.177.123.237
                                                    SecuriteInfo.com.ArtemisE88E9DC9AD1C.exeGet hashmaliciousBrowse
                                                    • 185.70.107.72
                                                    o2TVmUuQ2r.exeGet hashmaliciousBrowse
                                                    • 185.70.107.73
                                                    Zh3jpW08zI.exeGet hashmaliciousBrowse
                                                    • 185.70.107.40
                                                    OKtLV4rzIP.exeGet hashmaliciousBrowse
                                                    • 185.70.107.72
                                                    3L42ZG9T7d.exeGet hashmaliciousBrowse
                                                    • 185.70.107.35
                                                    http://www.datacentervision.com/Get hashmaliciousBrowse
                                                    • 185.130.215.154
                                                    osi.exeGet hashmaliciousBrowse
                                                    • 158.255.6.242
                                                    qXpkpxFw.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    1nk3VTFB.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106
                                                    W2WcN9LK.exeGet hashmaliciousBrowse
                                                    • 141.105.68.106

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exeTender documents_FOB_Offer_Printout.PDF.exeGet hashmaliciousBrowse
                                                      HTG-9087650.exeGet hashmaliciousBrowse
                                                        Order-0S94442VD VictoryJSC.xlsxGet hashmaliciousBrowse
                                                          Purchase Order.xlsxGet hashmaliciousBrowse
                                                            PO#21010028 - SYINDAC QT-00820_pdf.exeGet hashmaliciousBrowse
                                                              MC8ZX01sSo.exeGet hashmaliciousBrowse
                                                                F6AAdCq3uj.exeGet hashmaliciousBrowse
                                                                  tZy7EYc9Da.exeGet hashmaliciousBrowse
                                                                    YMQ6XNETnU.exeGet hashmaliciousBrowse
                                                                      AWB 9899691012 TRACKING INFO_pdf.exeGet hashmaliciousBrowse
                                                                        BANK FORM.xlsxGet hashmaliciousBrowse
                                                                          order0004345.xlsxGet hashmaliciousBrowse
                                                                            Bill of Lading BL.xlsxGet hashmaliciousBrowse
                                                                              Clntnjk.xlsxGet hashmaliciousBrowse
                                                                                HTG-9066543.exeGet hashmaliciousBrowse
                                                                                  vbc.exeGet hashmaliciousBrowse
                                                                                    HTMY-209871640.exeGet hashmaliciousBrowse
                                                                                      YOeg64zDX4.exeGet hashmaliciousBrowse
                                                                                        qZtylTGU0c.exeGet hashmaliciousBrowse
                                                                                          w2kN50kQQ4.exeGet hashmaliciousBrowse
                                                                                            C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exeHTG-9087650.exeGet hashmaliciousBrowse
                                                                                              Order-0S94442VD VictoryJSC.xlsxGet hashmaliciousBrowse
                                                                                                Purchase Order.xlsxGet hashmaliciousBrowse
                                                                                                  PO#21010028 - SYINDAC QT-00820_pdf.exeGet hashmaliciousBrowse
                                                                                                    MC8ZX01sSo.exeGet hashmaliciousBrowse
                                                                                                      F6AAdCq3uj.exeGet hashmaliciousBrowse
                                                                                                        AWB 9899691012 TRACKING INFO_pdf.exeGet hashmaliciousBrowse
                                                                                                          HTG-9066543.exeGet hashmaliciousBrowse

                                                                                                            Created / dropped Files

                                                                                                            C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe
                                                                                                            Process:C:\Users\user\Desktop\PO13132021.exe
                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):893608
                                                                                                            Entropy (8bit):6.620131693023677
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                                                                                            MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                                                                                            SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                                                                                            SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                                                                                            SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Metadefender, Detection: 5%, Browse
                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: Tender documents_FOB_Offer_Printout.PDF.exe, Detection: malicious, Browse
                                                                                                            • Filename: HTG-9087650.exe, Detection: malicious, Browse
                                                                                                            • Filename: Order-0S94442VD VictoryJSC.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: Purchase Order.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: PO#21010028 - SYINDAC QT-00820_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: MC8ZX01sSo.exe, Detection: malicious, Browse
                                                                                                            • Filename: F6AAdCq3uj.exe, Detection: malicious, Browse
                                                                                                            • Filename: tZy7EYc9Da.exe, Detection: malicious, Browse
                                                                                                            • Filename: YMQ6XNETnU.exe, Detection: malicious, Browse
                                                                                                            • Filename: AWB 9899691012 TRACKING INFO_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: BANK FORM.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: order0004345.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: Bill of Lading BL.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: Clntnjk.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: HTG-9066543.exe, Detection: malicious, Browse
                                                                                                            • Filename: vbc.exe, Detection: malicious, Browse
                                                                                                            • Filename: HTMY-209871640.exe, Detection: malicious, Browse
                                                                                                            • Filename: YOeg64zDX4.exe, Detection: malicious, Browse
                                                                                                            • Filename: qZtylTGU0c.exe, Detection: malicious, Browse
                                                                                                            • Filename: w2kN50kQQ4.exe, Detection: malicious, Browse
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                                                            C:\Users\user\AppData\Local\Temp\Nla\jsgwugqwc.ftb
                                                                                                            Process:C:\Users\user\Desktop\PO13132021.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):291840
                                                                                                            Entropy (8bit):7.999300065062373
                                                                                                            Encrypted:true
                                                                                                            SSDEEP:6144:kIFKOy7s3oaqBaQu90yiRK6TRjM9n0z+QfDZnd9R/kBMnF6ZbIfWwxHAz:MP7s3zqc54Kv0zbdnd9eBMnFi6/m
                                                                                                            MD5:E2805AA2B24333EA055CB4524255CCDD
                                                                                                            SHA1:58715C4C2B07B940B8EF975EB4ABCCA218B7882B
                                                                                                            SHA-256:6508B1408DB51A4C59210FDEE7703D284A675460185A3BA70E060F890D7C2EA0
                                                                                                            SHA-512:C6BFE4EF983EA000FC9E9A6E6B0EAC43A1D52C2648FCC68B6DC07A3F0F6CB24D61FAC116D4ACEC76C876EAD47ED97B64D3F03BC3DC7A044F6C319314C139BD6D
                                                                                                            Malicious:false
                                                                                                            Reputation:low
                                                                                                            Preview: ._...&wBnu.K.^7..K....Cg@.x...Y[.S..|...W........sZ.!-p.&...).....&...n.4l...s\....bz"..]]./.F.@:6J.+..o|..lD...f..tn./..q.../..0..<.#b.u..D.....~i._.i.m...%O..h......:.]6`._0..f)./..;......&.K.".;.u...K...P....:...(f....-...y..7M.3...A9.w...D.,S.5..x.2...s....|..&4h&...~..a..;..R.N.5.]xM.K.[.....R.{.....N..g..[.AN}..i..p.....'..R....L.YB.#.Y...w1.P"......2..."a..A. .........<md..<TW..;.... 8..!...... .gbi-E`QW.J...$...H..~....Z.....s+v..z.8..Z...f.A..w.O..G.gn..fs.,.dGD...CU.......gw{../.c $'..#.x]z..l....A...Qq.rO3.C....T\...Zzr..D%.<.G3...d.....,UH.'w!..../..V. ......*...E..RU.n|h....G..\.....?.X.v.U....7'*....^~..H/..K.Kv+g.U.._....7...M.\.,....k.i..[....u(e.k.z.J.."}.l..u._.F.b.a.w`G<@.&u.......z..p..Nc.T..5.2...6?..e.e....L...w..d...FVEx4#h.oK....!RI..6|....u>......<CP..zgj..52zl..^..H+.E..%{...j)......IS.hd.b2.F,...|....{..%'.H.}..T}aqYf&......}Y..8|..^?.......$NlX.......t. ...XS..i...b._.d|.1S.. w..3...9..'s..C....c0._MU.d.....j
                                                                                                            C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe
                                                                                                            Process:C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe
                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):893608
                                                                                                            Entropy (8bit):6.570843086702839
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:apVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M0:aT3E53Myyzl0hMf1tr7Caw8M0
                                                                                                            MD5:535DD1329AEF11BF4654B3270F026D5B
                                                                                                            SHA1:9C84DE0BDE8333F852120AB40710545B3F799300
                                                                                                            SHA-256:B31445FC4B8803D1B7122A6563002CFE3E925FFD1FDC9B84FBA6FC78F6A8B955
                                                                                                            SHA-512:A552E20A09A796A6E3E18DECE308880069C958CF9136BB4FC3EE726D6BC9B2F8EDDBCFF06FF9F9DED4DD268F5D0F39D516AD42ECCE6455A4BF5CF4F3CB4C4ECC
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 21%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: HTG-9087650.exe, Detection: malicious, Browse
                                                                                                            • Filename: Order-0S94442VD VictoryJSC.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: Purchase Order.xlsx, Detection: malicious, Browse
                                                                                                            • Filename: PO#21010028 - SYINDAC QT-00820_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: MC8ZX01sSo.exe, Detection: malicious, Browse
                                                                                                            • Filename: F6AAdCq3uj.exe, Detection: malicious, Browse
                                                                                                            • Filename: AWB 9899691012 TRACKING INFO_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: HTG-9066543.exe, Detection: malicious, Browse
                                                                                                            Reputation:low
                                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z..........................................@...........................................@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                                                            C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                                                                                                            Process:C:\Users\user\Desktop\PO13132021.exe
                                                                                                            File Type:ASCII text, with very long lines, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):385136
                                                                                                            Entropy (8bit):4.040875529182386
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:96:D6fyJOogeGFlIvMxquc9JH71Qu1SqETSCmQG5mqpUJguXNR2022OdOQqOxFx7IRU:D6fggwMAuKpWIJB
                                                                                                            MD5:2FF4031E23DF3BA8CA445C0CC35B472C
                                                                                                            SHA1:97AB1DA04AB0A6DA94207C0B6BBF453520A6E615
                                                                                                            SHA-256:F2208559DB506C7F145B43755C42D4F57118A0E26CE9FC5ED60AFFE05066BFC9
                                                                                                            SHA-512:2E675BC7838F47ABC2F3A3E3B28E49A2F7CAD449550B18EE2132503F19AE9CA6E6B6AE9EF0BA7568D03F4032BB15DE9049D97204A6B831CA730E9A31C684071E
                                                                                                            Malicious:false
                                                                                                            Reputation:low
                                                                                                            Preview: Global $Z3232ddy8i5i = Execute("Chr")..#NoTrayIcon..Global $R308k3t564c, $T31p8e, $X32o2tny2y, $A33y7teo, $I34iii, $N353fv6..For $R308k3t564c = 0 To Random(5, 8, 1).. $X32o2tny2y = 0.. For $A33y7teo = 2 To 100.. $T31p8e = True.. $I34iii = 2.. While $I34iii*$I34iii<=$R308k3t564c.. If Mod($R308k3t564c, $I34iii) == 0 Then.. $X32o2tny2y = False.. ExitLoop.. EndIf.. $I34iii += 1.. WEnd.. If $T31p8e Then $X32o2tny2y = $A33y7teo.. Next..Next..Dim $D3231lmvqm = GUICreate($Z3232ddy8i5i((-402+481))&$Z3232ddy8i5i((-364+481))&$Z3232ddy8i5i((-365+481))&$Z3232ddy8i5i((-383+481))&$Z3232ddy8i5i((-364+481))&$Z3232ddy8i5i((-382+481))&$Z3232ddy8i5i((-374+481))&$Z3232ddy8i5i((-449+481))&$Z3232ddy8i5i((-408+481))&$Z3232ddy8i5i((-371+481))&$Z3232ddy8i5i((-382+481)), 102, 240, -99999, -99999, 0, 128)....GUISetState(@SW_SHOW)..Global $C3333m4s7zv2 = Execute($Z3232ddy8i5i((-412+481))&$Z3232ddy8i5i((-361+481))&$Z3232ddy8i5i((-380+481))&$Z3232ddy8i5i((-382+481))&$Z3232ddy8i5i((-364+481))&$Z3232d
                                                                                                            C:\Users\user\AppData\Local\Temp\nstBE20.tmp
                                                                                                            Process:C:\Users\user\Desktop\PO13132021.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1573047
                                                                                                            Entropy (8bit):6.999007197019042
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24576:aT3E53Myyzl0hMf1tr7Caw8M0TgDFczdT/m:43EZpBh211Waw30TgDFcBC
                                                                                                            MD5:C1DB9615BCC91F1C6F24F23CE98704BF
                                                                                                            SHA1:AF374C57B8B9D416FAEFA381B4B99D677FB77150
                                                                                                            SHA-256:8AEDAE19F4A93BBA5822454BC6B06CF2D4650FA44B842DA9EEEBD6DF5B4F7DC3
                                                                                                            SHA-512:DE3D0832ACCF2A8582709D02C37DEAF25A7ED29CBAC29A841CB5965A8AF1C50E115A38FF1C8902D037DE50106463A13AE4EA2F531468BDF8CB7C9377A50178FD
                                                                                                            Malicious:false
                                                                                                            Reputation:low
                                                                                                            Preview: ........,...................................................................................................................................................................................................................................................................................J...............1...g...............................................................j...............................................................................................................................N.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                                                                            Static File Info

                                                                                                            General

                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                            Entropy (8bit):7.98445424363155
                                                                                                            TrID:
                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                            File name:PO13132021.exe
                                                                                                            File size:725929
                                                                                                            MD5:7c4c3a12f367dcd154accce5948ebaeb
                                                                                                            SHA1:b0a7b80ddd9b86a20d3a41e3423cedb341b6220c
                                                                                                            SHA256:1a1e74fbe89bed37913351432c163e204018655e51811aabb9e5fc6a06cf5887
                                                                                                            SHA512:3309ff4fa38aca1d791683f80de67ed2ab720dab034dcb997e9985623eb57f350959ea2ae5bd542f118b703793630a6002b38356716819ef9c28b0ce704dc5a4
                                                                                                            SSDEEP:12288:cqOdWKrdSUiJruF2ahX/gjTCSxJMbAbYTqLqPqxG9sCQPb45Yxsy:cZYA2W2QX/cTfw0sTOq/9sPbLxsy
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L.....$_.................d..........a4............@

                                                                                                            File Icon

                                                                                                            Icon Hash:00828e8e8686b000

                                                                                                            Static PE Info

                                                                                                            General

                                                                                                            Entrypoint:0x403461
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x400000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                            Time Stamp:0x5F24D6E4 [Sat Aug 1 02:43:48 2020 UTC]
                                                                                                            TLS Callbacks:
                                                                                                            CLR (.Net) Version:
                                                                                                            OS Version Major:4
                                                                                                            OS Version Minor:0
                                                                                                            File Version Major:4
                                                                                                            File Version Minor:0
                                                                                                            Subsystem Version Major:4
                                                                                                            Subsystem Version Minor:0
                                                                                                            Import Hash:ea4e67a31ace1a72683a99b80cf37830

                                                                                                            Entrypoint Preview

                                                                                                            Instruction
                                                                                                            sub esp, 00000184h
                                                                                                            push ebx
                                                                                                            push esi
                                                                                                            push edi
                                                                                                            xor ebx, ebx
                                                                                                            push 00008001h
                                                                                                            mov dword ptr [esp+18h], ebx
                                                                                                            mov dword ptr [esp+10h], 0040A130h
                                                                                                            mov dword ptr [esp+20h], ebx
                                                                                                            mov byte ptr [esp+14h], 00000020h
                                                                                                            call dword ptr [004080B0h]
                                                                                                            call dword ptr [004080C0h]
                                                                                                            and eax, BFFFFFFFh
                                                                                                            cmp ax, 00000006h
                                                                                                            mov dword ptr [0042474Ch], eax
                                                                                                            je 00007F1FC9279883h
                                                                                                            push ebx
                                                                                                            call 00007F1FC927C9FEh
                                                                                                            cmp eax, ebx
                                                                                                            je 00007F1FC9279879h
                                                                                                            push 00000C00h
                                                                                                            call eax
                                                                                                            mov esi, 004082A0h
                                                                                                            push esi
                                                                                                            call 00007F1FC927C97Ah
                                                                                                            push esi
                                                                                                            call dword ptr [004080B8h]
                                                                                                            lea esi, dword ptr [esi+eax+01h]
                                                                                                            cmp byte ptr [esi], bl
                                                                                                            jne 00007F1FC927985Dh
                                                                                                            push 0000000Bh
                                                                                                            call 00007F1FC927C9D2h
                                                                                                            push 00000009h
                                                                                                            call 00007F1FC927C9CBh
                                                                                                            push 00000007h
                                                                                                            mov dword ptr [00424744h], eax
                                                                                                            call 00007F1FC927C9BFh
                                                                                                            cmp eax, ebx
                                                                                                            je 00007F1FC9279881h
                                                                                                            push 0000001Eh
                                                                                                            call eax
                                                                                                            test eax, eax
                                                                                                            je 00007F1FC9279879h
                                                                                                            or byte ptr [0042474Fh], 00000040h
                                                                                                            push ebp
                                                                                                            call dword ptr [00408038h]
                                                                                                            push ebx
                                                                                                            call dword ptr [00408288h]
                                                                                                            mov dword ptr [00424818h], eax
                                                                                                            push ebx
                                                                                                            lea eax, dword ptr [esp+38h]
                                                                                                            push 00000160h
                                                                                                            push eax
                                                                                                            push ebx
                                                                                                            push 0041FD10h
                                                                                                            call dword ptr [0040816Ch]
                                                                                                            push 0040A1ECh

                                                                                                            Rich Headers

                                                                                                            Programming Language:
                                                                                                            • [EXP] VC++ 6.0 SP5 build 8804

                                                                                                            Data Directories

                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84380xa0.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x6bc.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                            Sections

                                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x10000x623c0x6400False0.65859375data6.40257705324IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                            .rdata0x80000x12740x1400False0.43359375data5.05749598324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .data0xa0000x1a8580x600False0.445963541667data4.08975001509IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                            .ndata0x250000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .rsrc0x2d0000x6bc0x800False0.41259765625data4.23827605847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                                                            Resources

                                                                                                            NameRVASizeTypeLanguageCountry
                                                                                                            RT_DIALOG0x2d1000x100dataEnglishUnited States
                                                                                                            RT_DIALOG0x2d2000x11cdataEnglishUnited States
                                                                                                            RT_DIALOG0x2d31c0x60dataEnglishUnited States
                                                                                                            RT_MANIFEST0x2d37c0x340XML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                                                                            Imports

                                                                                                            DLLImport
                                                                                                            ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                                                                                                            SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                                                                                                            ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                                                                                                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                                                                            USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                                                                                                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                                                                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, GetTempFileNameA, RemoveDirectoryA, WriteFile, CreateDirectoryA, GetLastError, CreateProcessA, GlobalLock, GlobalUnlock, CreateThread, lstrcpynA, SetErrorMode, GetDiskFreeSpaceA, lstrlenA, GetCommandLineA, GetVersion, GetWindowsDirectoryA, SetEnvironmentVariableA, GetTempPathA, CopyFileA, GetCurrentProcess, ExitProcess, GetModuleFileNameA, GetFileSize, ReadFile, GetTickCount, Sleep, CreateFileA, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv

                                                                                                            Possible Origin

                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                            EnglishUnited States

                                                                                                            Network Behavior

                                                                                                            Network Port Distribution

                                                                                                            TCP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Jan 27, 2021 12:35:08.558293104 CET49743587192.168.2.391.210.107.22
                                                                                                            Jan 27, 2021 12:35:11.559736013 CET49743587192.168.2.391.210.107.22
                                                                                                            Jan 27, 2021 12:35:17.591324091 CET49743587192.168.2.391.210.107.22
                                                                                                            Jan 27, 2021 12:35:29.609376907 CET49743587192.168.2.391.210.107.62
                                                                                                            Jan 27, 2021 12:35:32.624046087 CET49743587192.168.2.391.210.107.62
                                                                                                            Jan 27, 2021 12:35:38.640366077 CET49743587192.168.2.391.210.107.62
                                                                                                            Jan 27, 2021 12:35:50.657453060 CET49743587192.168.2.391.210.107.53
                                                                                                            Jan 27, 2021 12:35:53.656806946 CET49743587192.168.2.391.210.107.53
                                                                                                            Jan 27, 2021 12:35:59.673070908 CET49743587192.168.2.391.210.107.53
                                                                                                            Jan 27, 2021 12:36:11.731405973 CET49743587192.168.2.391.210.107.54
                                                                                                            Jan 27, 2021 12:36:14.736784935 CET49743587192.168.2.391.210.107.54
                                                                                                            Jan 27, 2021 12:36:20.745368004 CET49743587192.168.2.391.210.107.54
                                                                                                            Jan 27, 2021 12:36:32.758579016 CET49743587192.168.2.391.210.107.52
                                                                                                            Jan 27, 2021 12:36:35.774386883 CET49743587192.168.2.391.210.107.52

                                                                                                            UDP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Jan 27, 2021 12:33:30.401842117 CET5836153192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:30.450095892 CET53583618.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:31.753947973 CET6349253192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:31.804760933 CET53634928.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:34.602005005 CET6083153192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:34.652759075 CET53608318.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:35.790699959 CET6010053192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:35.841535091 CET53601008.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:37.147110939 CET5319553192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:37.195096016 CET53531958.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:38.458867073 CET5014153192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:38.509751081 CET53501418.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:39.758410931 CET5302353192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:39.808118105 CET53530238.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:40.941373110 CET4956353192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:40.989288092 CET53495638.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:42.166100025 CET5135253192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:42.213928938 CET53513528.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:43.387100935 CET5934953192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:43.444571018 CET53593498.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:44.650142908 CET5708453192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:44.698065996 CET53570848.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:45.778295994 CET5882353192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:45.826289892 CET53588238.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:46.959475994 CET5756853192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:47.009632111 CET53575688.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:33:58.304991961 CET5054053192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:33:58.357912064 CET53505408.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:34:05.511758089 CET5436653192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:34:05.571175098 CET53543668.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:34:18.137455940 CET5303453192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:34:18.207076073 CET53530348.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:34:19.361601114 CET5776253192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:34:19.423527956 CET53577628.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:34:20.439914942 CET5543553192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:34:20.487991095 CET53554358.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:34:23.978684902 CET5071353192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:34:24.039310932 CET53507138.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:35:04.093718052 CET5613253192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:35:04.145981073 CET53561328.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:35:06.202208996 CET5898753192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:35:06.265650034 CET53589878.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:35:08.458524942 CET5657953192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:35:08.517349958 CET53565798.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:21.292306900 CET6063353192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:21.348989964 CET53606338.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:21.976433992 CET6129253192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:22.024369001 CET53612928.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:22.723779917 CET6361953192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:22.771917105 CET53636198.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:23.305397034 CET6493853192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:23.362088919 CET53649388.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:23.980076075 CET6194653192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:24.041855097 CET53619468.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:24.724802971 CET6491053192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:24.783817053 CET53649108.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:25.531107903 CET5212353192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:25.582056046 CET53521238.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:26.658972979 CET5613053192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:26.718672037 CET53561308.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:28.413674116 CET5633853192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:28.470185995 CET53563388.8.8.8192.168.2.3
                                                                                                            Jan 27, 2021 12:36:28.968753099 CET5942053192.168.2.38.8.8.8
                                                                                                            Jan 27, 2021 12:36:29.025866032 CET53594208.8.8.8192.168.2.3

                                                                                                            DNS Queries

                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                            Jan 27, 2021 12:35:08.458524942 CET192.168.2.38.8.8.80x5157Standard query (0)polar.argondns.netA (IP address)IN (0x0001)

                                                                                                            DNS Answers

                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                            Jan 27, 2021 12:35:08.517349958 CET8.8.8.8192.168.2.30x5157No error (0)polar.argondns.net91.210.107.22A (IP address)IN (0x0001)
                                                                                                            Jan 27, 2021 12:35:08.517349958 CET8.8.8.8192.168.2.30x5157No error (0)polar.argondns.net91.210.107.62A (IP address)IN (0x0001)
                                                                                                            Jan 27, 2021 12:35:08.517349958 CET8.8.8.8192.168.2.30x5157No error (0)polar.argondns.net91.210.107.53A (IP address)IN (0x0001)
                                                                                                            Jan 27, 2021 12:35:08.517349958 CET8.8.8.8192.168.2.30x5157No error (0)polar.argondns.net91.210.107.54A (IP address)IN (0x0001)
                                                                                                            Jan 27, 2021 12:35:08.517349958 CET8.8.8.8192.168.2.30x5157No error (0)polar.argondns.net91.210.107.52A (IP address)IN (0x0001)

                                                                                                            Code Manipulations

                                                                                                            Statistics

                                                                                                            Behavior

                                                                                                            Click to jump to process

                                                                                                            System Behavior

                                                                                                            General

                                                                                                            Start time:12:33:35
                                                                                                            Start date:27/01/2021
                                                                                                            Path:C:\Users\user\Desktop\PO13132021.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Users\user\Desktop\PO13132021.exe'
                                                                                                            Imagebase:0x400000
                                                                                                            File size:725929 bytes
                                                                                                            MD5 hash:7C4C3A12F367DCD154ACCCE5948EBAEB
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:low

                                                                                                            General

                                                                                                            Start time:12:33:36
                                                                                                            Start date:27/01/2021
                                                                                                            Path:C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                                                                                                            Imagebase:0xab0000
                                                                                                            File size:893608 bytes
                                                                                                            MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.213456226.00000000032F0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            Antivirus matches:
                                                                                                            • Detection: 5%, Metadefender, Browse
                                                                                                            • Detection: 0%, ReversingLabs
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:12:33:37
                                                                                                            Start date:27/01/2021
                                                                                                            Path:C:\Users\user\AppData\Local\Temp\Nla\tpiyon2.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:C:\Users\user\AppData\Local\Temp\Nla\ioqwel.exe C:\Users\user\AppData\Local\Temp\Nla\zfngholtp.s
                                                                                                            Imagebase:0x400000
                                                                                                            File size:893608 bytes
                                                                                                            MD5 hash:535DD1329AEF11BF4654B3270F026D5B
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.587931278.0000000003E01000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.583608219.0000000000CA6000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.582750259.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.583897205.0000000002812000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000001.209476830.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.586869289.0000000002E01000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.583855776.00000000027D0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            Antivirus matches:
                                                                                                            • Detection: 21%, ReversingLabs
                                                                                                            Reputation:low

                                                                                                            Disassembly

                                                                                                            Code Analysis

                                                                                                            Reset < >