Loading ...

Play interactive tourEdit tour

Analysis Report NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe

Overview

General Information

Sample Name:NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
Analysis ID:344914
MD5:6ac388bc55e9b10f193b3e0bc0ff4af6
SHA1:c3c2e865b6b41ad7af8108efce76f1623e9b248e
SHA256:b813d2ed2581e4e3a454152e2dbd93c522583e4274d0523c8e3d424d9d192342
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.219247674.0000000003DD1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.219337362.0000000003EC4000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000000.00000002.218970499.0000000002DD1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe PID: 6032JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 1 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Scheduled temp file as task from temp locationShow sources
            Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe' , ParentImage: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, ParentProcessId: 6032, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp', ProcessId: 4684

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\wcJYGOnzoz.exeVirustotal: Detection: 31%Perma Link
            Source: C:\Users\user\AppData\Roaming\wcJYGOnzoz.exeReversingLabs: Detection: 13%
            Multi AV Scanner detection for submitted fileShow sources
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeVirustotal: Detection: 31%Perma Link
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeReversingLabs: Detection: 13%
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\wcJYGOnzoz.exeJoe Sandbox ML: detected
            Machine Learning detection for sampleShow sources
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeJoe Sandbox ML: detected

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0586D820

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.3:49747 -> 104.194.10.93:21
            Source: TrafficSnort IDS: 2029928 ET TROJAN AgentTesla HTML System Info Report Exfil via FTP 192.168.2.3:49748 -> 104.194.10.93:52972
            Source: global trafficTCP traffic: 192.168.2.3:49748 -> 104.194.10.93:52972
            Source: Joe Sandbox ViewASN Name: RELIABLESITEUS RELIABLESITEUS
            Source: unknownFTP traffic detected: 104.194.10.93:21 -> 192.168.2.3:49747 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
            Source: unknownDNS traffic detected: queries for: ftp.softg.com.ng
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.218970499.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219337362.0000000003EC4000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Installs a global keyboard hookShow sources
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            System Summary:

            barindex
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_02D4C2B00_2_02D4C2B0
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_02D499900_2_02D49990
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_0586E0580_2_0586E058
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_058671400_2_05867140
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_0586303D0_2_0586303D
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_05860C800_2_05860C80
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_05860C900_2_05860C90
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_05860A280_2_05860A28
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeCode function: 0_2_05860A380_2_05860A38
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.222377982.00000000062C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.222715103.0000000006A90000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.222715103.0000000006A90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.218330386.0000000000A12000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLCIDConversionAttribute.exeT vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219337362.0000000003EC4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameIzarxtdbJVYlVEUNzzEAImEVZLzfzC.exe4 vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.218998288.0000000002E14000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.222558063.0000000006990000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000003.00000002.215737906.0000000000392000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLCIDConversionAttribute.exeT vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000004.00000000.217085041.0000000000FC2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLCIDConversionAttribute.exeT vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeBinary or memory string: OriginalFilenameLCIDConversionAttribute.exeT vs NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: wcJYGOnzoz.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/5@1/1
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile created: C:\Users\user\AppData\Roaming\wcJYGOnzoz.exeJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4564:120:WilError_01
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeMutant created: \Sessions\1\BaseNamedObjects\wdLfldoNVrACd
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6100.tmpJump to behavior
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeVirustotal: Detection: 31%
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeReversingLabs: Detection: 13%
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile read: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe 'C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe'
            Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: unknownProcess created: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp'Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess created: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess created: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: initial sampleStatic PE information: section name: .text entropy: 7.67475810691
            Source: initial sampleStatic PE information: section name: .text entropy: 7.67475810691
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile created: \new urgent purchase order product list sheet 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile created: \new urgent purchase order product list sheet 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile created: \new urgent purchase order product list sheet 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile created: C:\Users\user\AppData\Roaming\wcJYGOnzoz.exeJump to dropped file

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp'
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM_3Show sources
            Source: Yara matchFile source: 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.218970499.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe PID: 6032, type: MEMORY
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWindow / User API: threadDelayed 3458Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWindow / User API: threadDelayed 6342Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe TID: 2792Thread sleep time: -51025s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe TID: 3088Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe TID: 5336Thread sleep time: -21213755684765971s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe TID: 5600Thread sleep count: 3458 > 30Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe TID: 5600Thread sleep count: 6342 > 30Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe TID: 5336Thread sleep count: 44 > 30Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp'Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess created: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeProcess created: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000000.00000002.219247674.0000000003DD1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.219337362.0000000003EC4000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe PID: 6032, type: MEMORY
            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000000.00000002.219247674.0000000003DD1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.219337362.0000000003EC4000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe PID: 6032, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection11Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Alternative Protocol1Encrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Obfuscated Files or Information2Input Capture11System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing2Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSSecurity Software Discovery321Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion14LSA SecretsVirtualization/Sandbox Evasion14SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection11Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe32%VirustotalBrowse
            NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe13%ReversingLabsWin32.Trojan.Pwsx
            NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\wcJYGOnzoz.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\wcJYGOnzoz.exe32%VirustotalBrowse
            C:\Users\user\AppData\Roaming\wcJYGOnzoz.exe13%ReversingLabsWin32.Trojan.Pwsx

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            ftp.softg.com.ng1%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            ftp.softg.com.ng
            104.194.10.93
            truetrueunknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.218970499.0000000002DD1000.00000004.00000001.sdmpfalse
              high
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipNEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe, 00000000.00000002.219337362.0000000003EC4000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              104.194.10.93
              unknownUnited States
              23470RELIABLESITEUStrue

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:344914
              Start date:27.01.2021
              Start time:13:08:58
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 40s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:34
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@8/5@1/1
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 13
              • Number of non-executed functions: 9
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
              • Excluded IPs from analysis (whitelisted): 104.43.193.48, 13.64.90.137, 51.11.168.160, 23.210.248.85, 95.101.22.224, 95.101.22.216, 20.54.26.129, 205.185.216.42, 205.185.216.10, 51.103.5.159, 51.104.139.180, 52.155.217.156
              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              13:09:50API Interceptor1184x Sleep call for process: NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe modified

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              104.194.10.93Swift Bank Copy #156065.pdf.exeGet hashmaliciousBrowse
                NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeGet hashmaliciousBrowse
                  NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeGet hashmaliciousBrowse
                    New Order.exeGet hashmaliciousBrowse

                      Domains

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      ftp.softg.com.ngSwift Bank Copy #156065.pdf.exeGet hashmaliciousBrowse
                      • 104.194.10.93
                      NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeGet hashmaliciousBrowse
                      • 104.194.10.93
                      NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeGet hashmaliciousBrowse
                      • 104.194.10.93
                      New Order.exeGet hashmaliciousBrowse
                      • 104.194.10.93

                      ASN

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      RELIABLESITEUSSwift Bank Copy #156065.pdf.exeGet hashmaliciousBrowse
                      • 104.194.10.93
                      NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeGet hashmaliciousBrowse
                      • 104.194.10.93
                      roboforex4multisetup.exeGet hashmaliciousBrowse
                      • 206.221.189.58
                      NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exeGet hashmaliciousBrowse
                      • 104.194.10.93
                      gPGTcEMoM1.exeGet hashmaliciousBrowse
                      • 104.238.220.186
                      XefNI6CwkP.exeGet hashmaliciousBrowse
                      • 45.58.112.77
                      fortrade4setup.exeGet hashmaliciousBrowse
                      • 206.221.189.58
                      dir2.exeGet hashmaliciousBrowse
                      • 104.238.220.186
                      dir1.exeGet hashmaliciousBrowse
                      • 104.238.220.186
                      #Ud83d#Udcde natasa.macovei@colt.net @ 1229 PM 1229 PM.pff.HTMGet hashmaliciousBrowse
                      • 172.96.140.18
                      SHIPPING INVOICEpdf.exeGet hashmaliciousBrowse
                      • 104.194.8.194
                      2021 Additional Agreement.exeGet hashmaliciousBrowse
                      • 104.238.220.186
                      ps.dllGet hashmaliciousBrowse
                      • 104.194.10.55
                      tesla.exeGet hashmaliciousBrowse
                      • 45.126.209.154
                      Changebookingdate.exeGet hashmaliciousBrowse
                      • 45.126.209.154
                      https://fdkl5.csb.app/Get hashmaliciousBrowse
                      • 45.58.124.226
                      https://shocking-foregoing-driver.glitch.meGet hashmaliciousBrowse
                      • 45.58.124.226
                      New Order.exeGet hashmaliciousBrowse
                      • 104.194.10.93
                      012018.exeGet hashmaliciousBrowse
                      • 104.243.45.190
                      Copy_C6AC.docGet hashmaliciousBrowse
                      • 45.126.209.154

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe.log
                      Process:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):1400
                      Entropy (8bit):5.344635889251176
                      Encrypted:false
                      SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEg:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHV
                      MD5:394E646B019FF472CE37EE76A647A27F
                      SHA1:BD5872D88EE9CD2299B5F0E462C53D9E7040D6DA
                      SHA-256:2295A0B1F6ACD75FB5D038ADE65725EDF3DDF076107AEA93E4A864E35974AE2A
                      SHA-512:7E95510C85262998AECC9A06A73A5BF6352304AF6EE143EC7E48A17473773F33A96A2F4146446444789B8BCC9B83372A227DC89C3D326A2E142BCA1E1A9B4809
                      Malicious:true
                      Reputation:moderate, very likely benign file
                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                      C:\Users\user\AppData\Local\Temp\tmp6100.tmp
                      Process:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1643
                      Entropy (8bit):5.195182470319441
                      Encrypted:false
                      SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBcGNtn:cbh47TlNQ//rydbz9I3YODOLNdq33
                      MD5:ADEE0252C1A3D7ED8D4CB921540B6F23
                      SHA1:4D56F7BC41FC5E4FE77CBBB918438F3F94106A0D
                      SHA-256:F7BB8C231A66C342AFC46F0548E6566C64C5B303A2697AD75C35898B098AB4F2
                      SHA-512:0C33F4A493DDA164AAC9F7D72DDA95BEBD6CA3507A7DDAE21E30B32011932812AA18AF9DC4810DC560DD0AB63F2A5C58C626F2FDFE881DA4149944F79A7CE924
                      Malicious:true
                      Reputation:low
                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                      C:\Users\user\AppData\Roaming\5vmcphy5.4qk\Chrome\Default\Cookies
                      Process:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3032001
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.6970840431455908
                      Encrypted:false
                      SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                      MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                      SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                      SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                      SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Roaming\wcJYGOnzoz.exe
                      Process:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):1047040
                      Entropy (8bit):7.618993069202847
                      Encrypted:false
                      SSDEEP:12288:6Uv/K5l68aT0CEaZtyakQ/wuBYPsIoHb+nlzZsWsE2SfnGLf/VwbN4+vtE+LtZ/W:9v/K5l68aT8aknsGoE2SOLlwqYTfV
                      MD5:6AC388BC55E9B10F193B3E0BC0FF4AF6
                      SHA1:C3C2E865B6B41AD7AF8108EFCE76F1623E9B248E
                      SHA-256:B813D2ED2581E4E3A454152E2DBD93C522583E4274D0523C8E3D424D9D192342
                      SHA-512:0D55B2EDD43412143F38BAD132C3A3A2219610C874B0C2CD4F293CB1692D6FA7283DECAD76FD0AE3B00C4596454A389C454FBF5F0E5B73AD8F88E22F7FA591A5
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: Virustotal, Detection: 32%, Browse
                      • Antivirus: ReversingLabs, Detection: 13%
                      Reputation:low
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.................. ... ....@.. .......................`............@.................................<...O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................p.......H........C...\...............d...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....op...(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....
                      C:\Users\user\AppData\Roaming\wcJYGOnzoz.exe:Zone.Identifier
                      Process:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview: [ZoneTransfer]....ZoneId=0

                      Static File Info

                      General

                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.618993069202847
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      File size:1047040
                      MD5:6ac388bc55e9b10f193b3e0bc0ff4af6
                      SHA1:c3c2e865b6b41ad7af8108efce76f1623e9b248e
                      SHA256:b813d2ed2581e4e3a454152e2dbd93c522583e4274d0523c8e3d424d9d192342
                      SHA512:0d55b2edd43412143f38bad132c3a3a2219610c874b0c2cd4f293cb1692d6fa7283decad76fd0ae3b00c4596454a389c454fbf5f0e5b73ad8f88e22f7fa591a5
                      SSDEEP:12288:6Uv/K5l68aT0CEaZtyakQ/wuBYPsIoHb+nlzZsWsE2SfnGLf/VwbN4+vtE+LtZ/W:9v/K5l68aT8aknsGoE2SOLlwqYTfV
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.................. ... ....@.. .......................`............@................................

                      File Icon

                      Icon Hash:92929e929e9e8ee2

                      Static PE Info

                      General

                      Entrypoint:0x4f048e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x601102C5 [Wed Jan 27 06:05:57 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:v4.0.30319
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                      Entrypoint Preview

                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xf043c0x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf20000x10f8c.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1040000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xee4940xee600False0.777965431633data7.67475810691IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rsrc0xf20000x10f8c0x11000False0.177418428309data5.41082924128IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1040000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_ICON0xf21300x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 318767104, next used block 117440512
                      RT_GROUP_ICON0x1029580x14data
                      RT_VERSION0x10296c0x434data
                      RT_MANIFEST0x102da00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                      Imports

                      DLLImport
                      mscoree.dll_CorExeMain

                      Version Infos

                      DescriptionData
                      Translation0x0000 0x04b0
                      LegalCopyright2021 (C) AuditFlags International
                      Assembly Version11.84.0.0
                      InternalNameLCIDConversionAttribute.exe
                      FileVersion11.84.0.0
                      CompanyNameAuditFlags International
                      LegalTrademarksAuditFlags
                      CommentsNon Versionable Attribute
                      ProductNameNon Versionable Attribute
                      ProductVersion11.84.0.0
                      FileDescriptionNon Versionable Attribute
                      OriginalFilenameLCIDConversionAttribute.exe

                      Network Behavior

                      Snort IDS Alerts

                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      01/27/21-13:11:36.340839TCP2029927ET TROJAN AgentTesla Exfil via FTP4974721192.168.2.3104.194.10.93
                      01/27/21-13:11:36.474169TCP2029928ET TROJAN AgentTesla HTML System Info Report Exfil via FTP4974852972192.168.2.3104.194.10.93

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Jan 27, 2021 13:11:35.085513115 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:35.213593006 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.213752031 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:35.343816996 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.345099926 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:35.472048044 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.472098112 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.472773075 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:35.641906023 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.686135054 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.686456919 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:35.813783884 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.813811064 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.814070940 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:35.941620111 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:35.942395926 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.069355965 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:36.069767952 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.197118044 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:36.200633049 CET4974852972192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.241496086 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.340318918 CET5297249748104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:36.340486050 CET4974852972192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.340838909 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.469507933 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:36.474169016 CET4974852972192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.475358963 CET4974852972192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.522949934 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.602929115 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:36.613097906 CET5297249748104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:36.614379883 CET5297249748104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:36.614541054 CET4974852972192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:36.647816896 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.340321064 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.469654083 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:37.470866919 CET4974962110192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.522872925 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.602408886 CET6211049749104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:37.602633953 CET4974962110192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.602966070 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.732239008 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:37.733433008 CET4974962110192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.733495951 CET4974962110192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.772897959 CET4974721192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.865151882 CET6211049749104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:37.865200043 CET6211049749104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:37.865230083 CET2149747104.194.10.93192.168.2.3
                      Jan 27, 2021 13:11:37.865267038 CET4974962110192.168.2.3104.194.10.93
                      Jan 27, 2021 13:11:37.913544893 CET4974721192.168.2.3104.194.10.93

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Jan 27, 2021 13:09:43.696324110 CET5836153192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:43.744245052 CET53583618.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:44.657226086 CET6349253192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:44.708415031 CET53634928.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:45.613053083 CET6083153192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:45.663837910 CET53608318.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:46.983957052 CET6010053192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:47.037990093 CET53601008.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:48.398194075 CET5319553192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:48.448151112 CET53531958.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:49.714911938 CET5014153192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:49.765640020 CET53501418.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:50.927064896 CET5302353192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:50.977127075 CET53530238.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:51.875458002 CET4956353192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:51.923460960 CET53495638.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:53.004487038 CET5135253192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:53.063175917 CET53513528.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:54.353805065 CET5934953192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:54.403966904 CET53593498.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:55.412123919 CET5708453192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:55.469188929 CET53570848.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:56.404776096 CET5882353192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:56.452795029 CET53588238.8.8.8192.168.2.3
                      Jan 27, 2021 13:09:57.370848894 CET5756853192.168.2.38.8.8.8
                      Jan 27, 2021 13:09:57.420466900 CET53575688.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:11.790249109 CET5054053192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:11.842590094 CET53505408.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:16.369446039 CET5436653192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:16.432280064 CET53543668.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:22.367731094 CET5303453192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:22.427658081 CET53530348.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:32.740448952 CET5776253192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:32.813951015 CET53577628.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:32.843992949 CET5543553192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:32.893315077 CET53554358.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:34.375591993 CET5071353192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:34.426392078 CET53507138.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:37.813103914 CET5613253192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:37.873816013 CET53561328.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:39.467014074 CET5898753192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:39.515470982 CET53589878.8.8.8192.168.2.3
                      Jan 27, 2021 13:10:40.021414995 CET5657953192.168.2.38.8.8.8
                      Jan 27, 2021 13:10:40.086673975 CET53565798.8.8.8192.168.2.3
                      Jan 27, 2021 13:11:17.730375051 CET6063353192.168.2.38.8.8.8
                      Jan 27, 2021 13:11:18.723169088 CET53606338.8.8.8192.168.2.3
                      Jan 27, 2021 13:11:34.787712097 CET6129253192.168.2.38.8.8.8
                      Jan 27, 2021 13:11:34.965647936 CET53612928.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:35.638895988 CET6361953192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:35.697612047 CET53636198.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:36.330755949 CET6493853192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:36.389739990 CET53649388.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:37.556020021 CET6194653192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:37.618256092 CET53619468.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:38.274713993 CET6491053192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:38.334306002 CET53649108.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:38.893723965 CET5212353192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:38.953238964 CET53521238.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:39.670677900 CET5613053192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:39.730005980 CET53561308.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:40.632364035 CET5633853192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:40.696209908 CET53563388.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:41.681993008 CET5942053192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:41.744244099 CET53594208.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:43.102271080 CET5878453192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:43.166619062 CET53587848.8.8.8192.168.2.3
                      Jan 27, 2021 13:12:43.747852087 CET6397853192.168.2.38.8.8.8
                      Jan 27, 2021 13:12:43.804404020 CET53639788.8.8.8192.168.2.3

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Jan 27, 2021 13:11:34.787712097 CET192.168.2.38.8.8.80xe293Standard query (0)ftp.softg.com.ngA (IP address)IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Jan 27, 2021 13:11:34.965647936 CET8.8.8.8192.168.2.30xe293No error (0)ftp.softg.com.ng104.194.10.93A (IP address)IN (0x0001)

                      FTP Packets

                      TimestampSource PortDest PortSource IPDest IPCommands
                      Jan 27, 2021 13:11:35.343816996 CET2149747104.194.10.93192.168.2.3220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21.220-This is a private system - No anonymous login
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 07:11. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                      Jan 27, 2021 13:11:35.345099926 CET4974721192.168.2.3104.194.10.93USER ogd@blessedxmhk.com.ng
                      Jan 27, 2021 13:11:35.472098112 CET2149747104.194.10.93192.168.2.3331 User ogd@blessedxmhk.com.ng OK. Password required
                      Jan 27, 2021 13:11:35.472773075 CET4974721192.168.2.3104.194.10.93PASS wealth@123455@@
                      Jan 27, 2021 13:11:35.686135054 CET2149747104.194.10.93192.168.2.3230 OK. Current restricted directory is /
                      Jan 27, 2021 13:11:35.813811064 CET2149747104.194.10.93192.168.2.3504 Unknown command
                      Jan 27, 2021 13:11:35.814070940 CET4974721192.168.2.3104.194.10.93PWD
                      Jan 27, 2021 13:11:35.941620111 CET2149747104.194.10.93192.168.2.3257 "/" is your current location
                      Jan 27, 2021 13:11:35.942395926 CET4974721192.168.2.3104.194.10.93TYPE I
                      Jan 27, 2021 13:11:36.069355965 CET2149747104.194.10.93192.168.2.3200 TYPE is now 8-bit binary
                      Jan 27, 2021 13:11:36.069767952 CET4974721192.168.2.3104.194.10.93PASV
                      Jan 27, 2021 13:11:36.197118044 CET2149747104.194.10.93192.168.2.3227 Entering Passive Mode (104,194,10,93,206,236)
                      Jan 27, 2021 13:11:36.340838909 CET4974721192.168.2.3104.194.10.93STOR PW_user-960781_2021_01_27_16_10_24.html
                      Jan 27, 2021 13:11:36.469507933 CET2149747104.194.10.93192.168.2.3150 Accepted data connection
                      Jan 27, 2021 13:11:36.602929115 CET2149747104.194.10.93192.168.2.3226-File successfully transferred
                      226-File successfully transferred226 0.133 seconds (measured here), 3.28 Kbytes per second
                      Jan 27, 2021 13:11:37.340321064 CET4974721192.168.2.3104.194.10.93PASV
                      Jan 27, 2021 13:11:37.469654083 CET2149747104.194.10.93192.168.2.3227 Entering Passive Mode (104,194,10,93,242,158)
                      Jan 27, 2021 13:11:37.602966070 CET4974721192.168.2.3104.194.10.93STOR CO_user-960781_2021_01_27_16_10_59.zip
                      Jan 27, 2021 13:11:37.732239008 CET2149747104.194.10.93192.168.2.3150 Accepted data connection
                      Jan 27, 2021 13:11:37.865230083 CET2149747104.194.10.93192.168.2.3226-File successfully transferred
                      226-File successfully transferred226 0.131 seconds (measured here), 9.84 Kbytes per second

                      Code Manipulations

                      Statistics

                      CPU Usage

                      Click to jump to process

                      Memory Usage

                      Click to jump to process

                      High Level Behavior Distribution

                      Click to dive into process behavior distribution

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:13:09:49
                      Start date:27/01/2021
                      Path:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe'
                      Imagebase:0x920000
                      File size:1047040 bytes
                      MD5 hash:6AC388BC55E9B10F193B3E0BC0FF4AF6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.219247674.0000000003DD1000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.219337362.0000000003EC4000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.219031171.0000000002E55000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.218970499.0000000002DD1000.00000004.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:13:09:52
                      Start date:27/01/2021
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wcJYGOnzoz' /XML 'C:\Users\user\AppData\Local\Temp\tmp6100.tmp'
                      Imagebase:0x1350000
                      File size:185856 bytes
                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:13:09:52
                      Start date:27/01/2021
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6b2800000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:13:09:53
                      Start date:27/01/2021
                      Path:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      Imagebase:0x2a0000
                      File size:1047040 bytes
                      MD5 hash:6AC388BC55E9B10F193B3E0BC0FF4AF6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low

                      General

                      Start time:13:09:53
                      Start date:27/01/2021
                      Path:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\NEW URGENT PURCHASE ORDER PRODUCT LIST SHEET 003847 pdf.exe
                      Imagebase:0xed0000
                      File size:1047040 bytes
                      MD5 hash:6AC388BC55E9B10F193B3E0BC0FF4AF6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:low

                      Disassembly

                      Code Analysis

                      Reset < >

                        Executed Functions

                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70cd4ff1e98837aed795d735ddec32d9ec64ea5831587e2c6adc24d90f565d3e
                        • Instruction ID: d42f5bde99f0e667fbb9e08f293a49582947792f966248565819206e45c84fc9
                        • Opcode Fuzzy Hash: 70cd4ff1e98837aed795d735ddec32d9ec64ea5831587e2c6adc24d90f565d3e
                        • Instruction Fuzzy Hash: DD328734B012049FDB25DB6AC464BABB7FBAF88704F244469E906DB390DB35ED05CB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02D4DD8A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: CreateWindow
                        • String ID: Zk&6$Zk&6
                        • API String ID: 716092398-716038083
                        • Opcode ID: 6abf4c939e31db2985ed634d7b0a053ca187798b18217d703e8270043e4cf0b8
                        • Instruction ID: 896695c3e89990709657c7eb8fffc65ea770f15a8e7a0bb41236fd0c68b47ec3
                        • Opcode Fuzzy Hash: 6abf4c939e31db2985ed634d7b0a053ca187798b18217d703e8270043e4cf0b8
                        • Instruction Fuzzy Hash: 376102B1C04348AFCF12CFA9C994ADDBFB2BF49304F19815AE918AB221D7749945CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02D4DD8A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: CreateWindow
                        • String ID: Zk&6$Zk&6
                        • API String ID: 716092398-716038083
                        • Opcode ID: 5f7d4deb96fa06fb728ca2ec576302f00502109e36f12e39693825ed464922bc
                        • Instruction ID: 66be9f6e6f8fb02bcdf318ad1c679f816bb1fc003e880167d597f046ca64f93b
                        • Opcode Fuzzy Hash: 5f7d4deb96fa06fb728ca2ec576302f00502109e36f12e39693825ed464922bc
                        • Instruction Fuzzy Hash: 2551B0B1D00309DFDB14CF99C984ADEBBB6BF49314F24812AE819AB310DB749985CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 02D4BE0E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: HandleModule
                        • String ID: Zk&6
                        • API String ID: 4139908857-3440509606
                        • Opcode ID: a6c71e4b26b1da8d564f5f7dadf903ab096e2e30999b7dfd1a4203dadb98a12f
                        • Instruction ID: 0e10508d1a3736e48981defd1353cef616ae9e5448d1be49caff6bf14706ee0e
                        • Opcode Fuzzy Hash: a6c71e4b26b1da8d564f5f7dadf903ab096e2e30999b7dfd1a4203dadb98a12f
                        • Instruction Fuzzy Hash: AE712370A00B058FD724DF2AD48179ABBF1FF88208F00892AD596D7B40DB35E946CF91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D46E3F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID: Zk&6
                        • API String ID: 3793708945-3440509606
                        • Opcode ID: 15d1cb7b81697ffb3126cbe63684b9e1f6599084ce7f13c3f7281db71213c5c7
                        • Instruction ID: c55c2ef8416afb940432f35f7a168aa8f83402b4059684919560914d647bedd1
                        • Opcode Fuzzy Hash: 15d1cb7b81697ffb3126cbe63684b9e1f6599084ce7f13c3f7281db71213c5c7
                        • Instruction Fuzzy Hash: A9414676900258AFCB01CF99D844AEEBFF9EF49320F04801AEA14A7351D779E954DFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D46E3F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID: Zk&6
                        • API String ID: 3793708945-3440509606
                        • Opcode ID: ffeda7d8d2de853f5cee9e14a862826e1b289fcee04a1401c47c30d2ade3a25a
                        • Instruction ID: 2202ea3bc1b29034c3fe6e3de95fb575697f9637b7e36e3fd2d66ee737f7c0fd
                        • Opcode Fuzzy Hash: ffeda7d8d2de853f5cee9e14a862826e1b289fcee04a1401c47c30d2ade3a25a
                        • Instruction Fuzzy Hash: 7321E6B59002589FDB10CF99D984ADEBBF8FF48314F15801AE914B7310D778A955CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D46E3F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID: Zk&6
                        • API String ID: 3793708945-3440509606
                        • Opcode ID: 5f9dbb939c6296139ab774629efbf74fdd5cd361dac242ea69c0773e5f24f1c9
                        • Instruction ID: 189977b1af69f018f8704c44397013ef69d096e64f8818d37582b76e4231406c
                        • Opcode Fuzzy Hash: 5f9dbb939c6296139ab774629efbf74fdd5cd361dac242ea69c0773e5f24f1c9
                        • Instruction Fuzzy Hash: A321D5B5D002489FDB10CFA9D984ADEBBF8FB49324F14841AE915B7310D774A954CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02D4BE89,00000800,00000000,00000000), ref: 02D4C09A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: Zk&6
                        • API String ID: 1029625771-3440509606
                        • Opcode ID: 9dfad80ced5d66c8345bd11667997591fa44b2f45374bfe72621c6a912c8608b
                        • Instruction ID: 6989bdb452e956ebe9d4429b0c065f174197dc38db812e5b7f7223af19e5ff91
                        • Opcode Fuzzy Hash: 9dfad80ced5d66c8345bd11667997591fa44b2f45374bfe72621c6a912c8608b
                        • Instruction Fuzzy Hash: 8A1103B29012088FCB20CF9AD844BDEBBF4EB48314F10842AE919B7700C775A945CFA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,02D4BE89,00000800,00000000,00000000), ref: 02D4C09A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: Zk&6
                        • API String ID: 1029625771-3440509606
                        • Opcode ID: e354533f42690d2bbfd91c90d275906a1f5046dcb093cf4d88cd88277ffadb07
                        • Instruction ID: 40cf2e625d8b85d71cb48851d3cb0fdc942b5412b34565b92cf41923eb6fa5a9
                        • Opcode Fuzzy Hash: e354533f42690d2bbfd91c90d275906a1f5046dcb093cf4d88cd88277ffadb07
                        • Instruction Fuzzy Hash: 361100B69002098FCB10CFAAC544BDEFBF4AB48314F15852AD929AB600C775A949CFA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindCloseChangeNotification.KERNEL32(?), ref: 0586E9C0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID: Zk&6
                        • API String ID: 2591292051-3440509606
                        • Opcode ID: b79ce73207849a6b37d6574f8bebec58192826b2782b75179ba375a777ad1a85
                        • Instruction ID: 8dfca1db9726e60621c80997ca9faa35135913c32766fdc888eae12ffbe0906d
                        • Opcode Fuzzy Hash: b79ce73207849a6b37d6574f8bebec58192826b2782b75179ba375a777ad1a85
                        • Instruction Fuzzy Hash: 531145B58006098FCB20DF99C444BDEBBF4FF48324F10842AD968A7740D738A948CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 02D4BE0E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: HandleModule
                        • String ID: Zk&6
                        • API String ID: 4139908857-3440509606
                        • Opcode ID: 04c92e6430933b8297404fc856f0513ee122546882bc1e94fa549c9ac5a733ac
                        • Instruction ID: 3c60943586b718282927b83558453a3d312acf361c0b8e210949fa3f4bf05aaf
                        • Opcode Fuzzy Hash: 04c92e6430933b8297404fc856f0513ee122546882bc1e94fa549c9ac5a733ac
                        • Instruction Fuzzy Hash: 1611DFB6D006498FDB10CF9AC444ADEFBF4EB88328F15846AD929A7700D774A945CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowLongW.USER32(?,?,?), ref: 02D4DF1D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: LongWindow
                        • String ID: Zk&6
                        • API String ID: 1378638983-3440509606
                        • Opcode ID: 3f01431ad74bb85e829038a4394b02d89a4a769ad99acb1512f8bec948e1926e
                        • Instruction ID: 3bf1068a9785861dffbcaeece4edd413b57c14e38a43f4c204d2c0cb0e8f7cd5
                        • Opcode Fuzzy Hash: 3f01431ad74bb85e829038a4394b02d89a4a769ad99acb1512f8bec948e1926e
                        • Instruction Fuzzy Hash: F811E2B59002499FDB20CF9AD584BDEBBF8EB48324F10855AE919B7740C374A944CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowLongW.USER32(?,?,?), ref: 02D4DF1D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID: LongWindow
                        • String ID: Zk&6
                        • API String ID: 1378638983-3440509606
                        • Opcode ID: 7be3fefeaa3afadf9264ff884bb1885ec09069fe09e1f9631d382cd292cbd1a6
                        • Instruction ID: 1909f5991a49ed5eb0141442331a18dc9d29a8712d9682621434518e40ff4259
                        • Opcode Fuzzy Hash: 7be3fefeaa3afadf9264ff884bb1885ec09069fe09e1f9631d382cd292cbd1a6
                        • Instruction Fuzzy Hash: 501100B69002498FDB10CF99D584BDEBBF4EB48324F14855AE919A7740C374AA44CFA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Non-executed Functions

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID: ?
                        • API String ID: 0-1684325040
                        • Opcode ID: 7a6b649ca25320b90388f8e1589a68f451edc7ed870aa6c117a7e6308a8dfc43
                        • Instruction ID: c1a1dc11cfcacd6494baf298f86e5e43a6b601ae9ffd4e0f750a04eee57a20f6
                        • Opcode Fuzzy Hash: 7a6b649ca25320b90388f8e1589a68f451edc7ed870aa6c117a7e6308a8dfc43
                        • Instruction Fuzzy Hash: CCB19EB0D5462ECBDB64DF69C980B9DBBF5FB88204F0081E5D55CA6206EB309E95CF48
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 640f9f95468df1ec2cbe904071627e7587cc6450d8239894f28cecd31de18b37
                        • Instruction ID: df640f31d67dca2b701e19e70c4a953c544afb1c051d55b80849c58586bc728e
                        • Opcode Fuzzy Hash: 640f9f95468df1ec2cbe904071627e7587cc6450d8239894f28cecd31de18b37
                        • Instruction Fuzzy Hash: B05286B1985706CBD712CF14F8A82997BB1FB46328FD04A09C1616BBD0D7B46D6ACF84
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.218861835.0000000002D40000.00000040.00000001.sdmp, Offset: 02D40000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d09eddf5917c25dde554c73c90637807874b871590c78feef8e0e42a4b7d636e
                        • Instruction ID: fc2e18575606a5132f54cff7e412b706592959965980122b06ce0108cccd02dc
                        • Opcode Fuzzy Hash: d09eddf5917c25dde554c73c90637807874b871590c78feef8e0e42a4b7d636e
                        • Instruction Fuzzy Hash: 00A14836E006198FCF05DFA5C8545DEBBB2FF85308B15856AE805AB321EB71ED15CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b6cbf1e5b6a702d7900ef2fa3ad6a717e4fcf99f72c81cf3a6cc50c286633206
                        • Instruction ID: 094a4dd7acc0c74add1f5b6c34d74a5ac8a9cee15ffc1793eebbce9ca39e6512
                        • Opcode Fuzzy Hash: b6cbf1e5b6a702d7900ef2fa3ad6a717e4fcf99f72c81cf3a6cc50c286633206
                        • Instruction Fuzzy Hash: F1A1F274E04248CFDB04DFE9C584AAEBBF6FB48318F249129E815EB344DB749985CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d615e54216c13068ee8bb895dc649a12c5f88d0a74b1ba88e128a141b6f67d9
                        • Instruction ID: ff79431fb07b90e3afd2f0c2c16df5616d9755e4bdd2facccd125e4fc6416a97
                        • Opcode Fuzzy Hash: 0d615e54216c13068ee8bb895dc649a12c5f88d0a74b1ba88e128a141b6f67d9
                        • Instruction Fuzzy Hash: A2519F71A262488FCB45EFB9E84269E7BF6EB84304F04C829E1049B324DF755D45DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5088920bf3db8abe63a388d3794f7c408b832bb3192fe61da385e25946993a2b
                        • Instruction ID: e2d66c418835a771d49fa56fadc3f435584f097462507d26bb3ccd9b74f85e33
                        • Opcode Fuzzy Hash: 5088920bf3db8abe63a388d3794f7c408b832bb3192fe61da385e25946993a2b
                        • Instruction Fuzzy Hash: CB519E71E262488FCB45EFB9E84169E7BF6EB88304F00C829E1049B324EF755D45DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b1d28f4dbd2cc69c17a7ebaa14960d4b367479c8a16c00c6c619e2f14f2abf17
                        • Instruction ID: 1cf573b0b5cc8fb676b83cbb14df2d3be8e2a675aeb98d1ba1c86430c3d2d931
                        • Opcode Fuzzy Hash: b1d28f4dbd2cc69c17a7ebaa14960d4b367479c8a16c00c6c619e2f14f2abf17
                        • Instruction Fuzzy Hash: 1D4143B1E056588BEB5CCF6B8C4468EFAF7AFC9300F14C5BA890DAA215EB7009458F15
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0e908e1f537a950ea3e4c2779421bd67fd58282b0e3a475e6f371b6b0988d388
                        • Instruction ID: f64b9d6ff56307f968a172194f389c9b2b8f757bd563083f4f55a07e4d6b3ff2
                        • Opcode Fuzzy Hash: 0e908e1f537a950ea3e4c2779421bd67fd58282b0e3a475e6f371b6b0988d388
                        • Instruction Fuzzy Hash: B54158B1E056588BEB5CCF6B8C4568EFAF7BFC9310F14C5BAC90CAA215DB7009468E15
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.222314432.0000000005860000.00000040.00000001.sdmp, Offset: 05860000, based on PE: false
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 27bd7d2c13fcd68d5e49b7e5b07ec6cfb103f2ccf0932e8e89732eb73ebdc052
                        • Instruction ID: 0262613b6e4a645c2d861b96cc701ccab2c4bc1d39234c90c74b959b2eddfd76
                        • Opcode Fuzzy Hash: 27bd7d2c13fcd68d5e49b7e5b07ec6cfb103f2ccf0932e8e89732eb73ebdc052
                        • Instruction Fuzzy Hash: F5115A70E0A2188BDB14CFA5C419BEDBBF1BB4E305F149869D815B3290C7788944CF68
                        Uniqueness

                        Uniqueness Score: -1.00%