Loading ...

Play interactive tourEdit tour

Analysis Report Muligheds.exe

Overview

General Information

Sample Name:Muligheds.exe
Analysis ID:356091
MD5:4aa8881d2d0103703bd7301616cd8caf
SHA1:e21e7048c04cad52b8f1ddfaa60135d0399ae202
SHA256:24e85ac996d35004ddc5768581a4c025c8620a5f42896d33c02f00c64d921e2f
Tags:exeGuLoader

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected AgentTesla
Yara detected GuLoader
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Muligheds.exe (PID: 5896 cmdline: 'C:\Users\user\Desktop\Muligheds.exe' MD5: 4AA8881D2D0103703BD7301616CD8CAF)
    • RegAsm.exe (PID: 3868 cmdline: 'C:\Users\user\Desktop\Muligheds.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 3892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.469137619.0000000001211000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: RegAsm.exe PID: 3868JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 3868JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: Muligheds.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Uses secure TLS version for HTTPS connectionsShow sources
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.3:49711 version: TLS 1.2
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS traffic detected: queries for: doc-0c-58-docs.googleusercontent.com
            Source: RegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: http://THoUbE.com
            Source: RegAsm.exeString found in binary or memory: https://drive.google.com/uc?export=download&id=1BCajiRx7Eb3aEQfR45eBviRxNQMQ93hS
            Source: RegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.3:49711 version: TLS 1.2
            Source: Muligheds.exe, 00000000.00000002.327283395.000000000074A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: C:\Users\user\Desktop\Muligheds.exeProcess Stats: CPU usage > 98%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01215774 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_012153A6 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0121578C NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_012157D0 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0121582C NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01215882 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_012158D6 NtQueryInformationProcess,
            Source: C:\Users\user\Desktop\Muligheds.exeCode function: 0_2_00401859
            Source: C:\Users\user\Desktop\Muligheds.exeCode function: 0_2_0040180C
            Source: C:\Users\user\Desktop\Muligheds.exeCode function: 0_2_0040161D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1FFE47A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1FFE4790
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_201A90D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_201A7120
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_201A6508
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_201A6850
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
            Source: Muligheds.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal84.troj.evad.winEXE@4/0@1/1
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3892:120:WilError_01
            Source: C:\Users\user\Desktop\Muligheds.exeFile created: C:\Users\user\AppData\Local\Temp\~DFF74510EC8D1D8160.TMPJump to behavior
            Source: Muligheds.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Muligheds.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Muligheds.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Muligheds.exe 'C:\Users\user\Desktop\Muligheds.exe'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Muligheds.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Muligheds.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Muligheds.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000008.00000002.469137619.0000000001211000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3868, type: MEMORY
            Source: C:\Users\user\Desktop\Muligheds.exeCode function: 0_2_00407D1C push esp; retf
            Source: C:\Users\user\Desktop\Muligheds.exeCode function: 0_2_00407264 push es; retf
            Source: C:\Users\user\Desktop\Muligheds.exeCode function: 0_2_004072E3 push es; retf
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_012156CF push esp; ret
            Source: C:\Users\user\Desktop\Muligheds.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\Muligheds.exeRDTSC instruction interceptor: First address: 0000000000722671 second address: 0000000000722671 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F9B4CB6B488h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007F9B4CB6B471h 0x00000026 push ecx 0x00000027 cmp ch, dh 0x00000029 call 00007F9B4CB6B4A2h 0x0000002e call 00007F9B4CB6B498h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\Muligheds.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\Muligheds.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\Muligheds.exeRDTSC instruction interceptor: First address: 0000000000722671 second address: 0000000000722671 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F9B4CB6B488h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007F9B4CB6B471h 0x00000026 push ecx 0x00000027 cmp ch, dh 0x00000029 call 00007F9B4CB6B4A2h 0x0000002e call 00007F9B4CB6B498h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\Muligheds.exeRDTSC instruction interceptor: First address: 0000000000722810 second address: 0000000000722810 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F9B4CBB1AFFh 0x0000001d popad 0x0000001e cmp ebx, D5708B63h 0x00000024 call 00007F9B4CBAF71Dh 0x00000029 lfence 0x0000002c rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001212810 second address: 0000000001212810 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F9B4CB6D86Fh 0x0000001d popad 0x0000001e cmp ebx, D5708B63h 0x00000024 call 00007F9B4CB6B48Dh 0x00000029 lfence 0x0000002c rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01212D41 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 371
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9440
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1320Thread sleep time: -8301034833169293s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\Muligheds.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\Muligheds.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01212D41 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0121333E LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01212512 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01214916 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01214F70 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01214F72 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_012140B9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\Muligheds.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Muligheds.exe'
            Source: RegAsm.exe, 00000008.00000002.469678278.0000000001990000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000008.00000002.469678278.0000000001990000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000008.00000002.469678278.0000000001990000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000008.00000002.469678278.0000000001990000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3868, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3868, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3868, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Process Injection12Virtualization/Sandbox Evasion34Input Capture1Security Software Discovery631Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Disable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion34Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery313VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            No Antivirus matches

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://THoUbE.com0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            googlehosted.l.googleusercontent.com
            142.250.186.33
            truefalse
              high
              doc-0c-58-docs.googleusercontent.com
              unknown
              unknownfalse
                high

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://THoUbE.comRegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSRegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                142.250.186.33
                unknownUnited States
                15169GOOGLEUSfalse

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:356091
                Start date:22.02.2021
                Start time:14:47:32
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 43s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:Muligheds.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:14
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal84.troj.evad.winEXE@4/0@1/1
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 65.1% (good quality ratio 45.1%)
                • Quality average: 48.5%
                • Quality standard deviation: 36.1%
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                • TCP Packets have been reduced to 100
                • Excluded IPs from analysis (whitelisted): 52.255.188.83, 13.88.21.125, 104.43.139.144, 184.30.20.56, 8.241.80.126, 67.27.141.126, 8.252.5.126, 8.241.126.249, 8.250.157.254, 216.58.212.174
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, drive.google.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                14:49:24API Interceptor389x Sleep call for process: RegAsm.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                googlehosted.l.googleusercontent.com2021-Nouvelle masse salariale-Rapport.htmlGet hashmaliciousBrowse
                • 216.58.209.33
                SOLICITUD DE HERJIMAR, SL (HJM-745022821).exeGet hashmaliciousBrowse
                • 216.58.208.161
                #U6211#U662f#U56fe#U7247.exeGet hashmaliciousBrowse
                • 216.58.208.161
                OneNote rmos@dataflex-int.com.htmlGet hashmaliciousBrowse
                • 216.58.208.129
                Sponsor A Child, Best Online Donation Site, Top NGO - World Vision India.htmlGet hashmaliciousBrowse
                • 172.217.20.225
                barcelona-v-psg-liv-uefa-2021.htmlGet hashmaliciousBrowse
                • 172.217.20.225
                Barcelona-v-PSG-0tv.htmlGet hashmaliciousBrowse
                • 172.217.20.225
                CONSTRUCCIONES SAN MART#U00cdN, S.A. SOLICITAR. (SMT-14517022021).exeGet hashmaliciousBrowse
                • 172.217.20.225
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.208.161
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.208.161
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.208.161
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.208.161
                OEVGVSOGAH.dllGet hashmaliciousBrowse
                • 216.58.206.65
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.206.65
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.206.65
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.206.65
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.206.65
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.206.65
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.206.65
                executable.908.exeGet hashmaliciousBrowse
                • 216.58.206.65

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                GOOGLEUSX1(1).xlsmGet hashmaliciousBrowse
                • 142.250.186.66
                DHL Document. PDF.exeGet hashmaliciousBrowse
                • 34.102.136.180
                ydQ0ICWj5v.exeGet hashmaliciousBrowse
                • 35.228.227.140
                r4yGYPyWb7.exeGet hashmaliciousBrowse
                • 35.228.227.140
                X1(1).xlsmGet hashmaliciousBrowse
                • 142.250.186.66
                aif9fEvN5g.exeGet hashmaliciousBrowse
                • 35.228.227.140
                IMG_01670_Scanned.docGet hashmaliciousBrowse
                • 35.200.172.247
                eInvoice.exeGet hashmaliciousBrowse
                • 34.102.136.180
                IMG_7742_Scanned.docGet hashmaliciousBrowse
                • 34.102.136.180
                SWIFT Payment W0301.docGet hashmaliciousBrowse
                • 35.200.172.247
                Outstanding Invoices.pdf.exeGet hashmaliciousBrowse
                • 34.102.136.180
                PDF.exeGet hashmaliciousBrowse
                • 34.102.136.180
                message_zdm (2).htmlGet hashmaliciousBrowse
                • 172.217.16.150
                002.docxGet hashmaliciousBrowse
                • 216.239.38.21
                002.docxGet hashmaliciousBrowse
                • 216.239.32.21
                1.apkGet hashmaliciousBrowse
                • 216.58.212.170
                Small Charities.xlsxGet hashmaliciousBrowse
                • 74.125.133.156
                Small Charities.xlsxGet hashmaliciousBrowse
                • 74.125.133.155
                1.apkGet hashmaliciousBrowse
                • 142.250.180.163
                SKBM 0222..exeGet hashmaliciousBrowse
                • 216.239.32.21

                JA3 Fingerprints

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                37f463bf4616ecd445d4a1937da06e19DHL_6368638172 documento de recibo,pdf.exeGet hashmaliciousBrowse
                • 142.250.186.33
                PDF.exeGet hashmaliciousBrowse
                • 142.250.186.33
                pagamento.exeGet hashmaliciousBrowse
                • 142.250.186.33
                message_zdm (2).htmlGet hashmaliciousBrowse
                • 142.250.186.33
                Statement-ID28865611496334.vbsGet hashmaliciousBrowse
                • 142.250.186.33
                Statement-ID21488878391791.vbsGet hashmaliciousBrowse
                • 142.250.186.33
                frank_2021-02-22_02-03.exeGet hashmaliciousBrowse
                • 142.250.186.33
                Statement-ID72347595684775.vbsGet hashmaliciousBrowse
                • 142.250.186.33
                MR52.vbsGet hashmaliciousBrowse
                • 142.250.186.33
                Scan_medcal equipment sample_pdf.exeGet hashmaliciousBrowse
                • 142.250.186.33
                rfq02212021.exeGet hashmaliciousBrowse
                • 142.250.186.33
                RE ICA 40 Sdn Bhd- Purchase Order#6769704.exeGet hashmaliciousBrowse
                • 142.250.186.33
                RFQ-#09503.exeGet hashmaliciousBrowse
                • 142.250.186.33
                RFQ_1101983736366355 1101938377388.exeGet hashmaliciousBrowse
                • 142.250.186.33
                Offer Request 6100003768.exeGet hashmaliciousBrowse
                • 142.250.186.33
                124992436.docxGet hashmaliciousBrowse
                • 142.250.186.33
                scarf.exeGet hashmaliciousBrowse
                • 142.250.186.33
                Copy_remittnce.exeGet hashmaliciousBrowse
                • 142.250.186.33
                document-1900770373.xlsGet hashmaliciousBrowse
                • 142.250.186.33
                AswpCUetE0.docGet hashmaliciousBrowse
                • 142.250.186.33

                Dropped Files

                No context

                Created / dropped Files

                No created / dropped files found

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):5.399140948343833
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.15%
                • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:Muligheds.exe
                File size:73728
                MD5:4aa8881d2d0103703bd7301616cd8caf
                SHA1:e21e7048c04cad52b8f1ddfaa60135d0399ae202
                SHA256:24e85ac996d35004ddc5768581a4c025c8620a5f42896d33c02f00c64d921e2f
                SHA512:0f8b546c0cfdf82c6e39b206f36f88fc458306c795a8c84b7b97cdd6ead6942742ea04bd20e0cbbf9887484c6754cbf8c6a05c1eca8ee4c7e93115681813968b
                SSDEEP:1536:NDl1YJvgC/9jLqF8hgCNIB3smGKzl85zlYwhdFD:N5WJxIbCNIB3PGSlozl1nF
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.......................D.......=.......Rich............PE..L......S.....................0....................@................

                File Icon

                Icon Hash:1e74f2ea62e4a082

                Static PE Info

                General

                Entrypoint:0x401494
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:
                Time Stamp:0x5304B2E8 [Wed Feb 19 13:34:32 2014 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:b84199caadebcbcd5f63d7b7de7ff518

                Entrypoint Preview

                Instruction
                push 00409FECh
                call 00007F9B4CCB7AC3h
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                xor byte ptr [eax], al
                add byte ptr [eax], al
                inc eax
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [esi], cl
                dec esi
                cmpsd
                xor eax, esp
                retf 496Eh
                sahf
                inc esi
                sbb ebx, dword ptr [eax+7899F8EEh]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add dword ptr [eax], eax
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                inc ecx
                dec esp
                inc esp
                inc ebp
                push edx
                push ebx
                push ebx
                push esi
                dec ebx
                dec ebx
                inc ebp
                inc esp
                inc ebp
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add bh, bh
                int3
                xor dword ptr [eax], eax
                or dword ptr [ebx-25B2B446h], esi
                aaa
                inc ecx
                lahf
                popad
                mov edi, dword ptr [ecx+edx*8-60h]
                sti

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xf0f40x28.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000xc04.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                IMAGE_DIRECTORY_ENTRY_IAT0x10000x150.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000xe6940xf000False0.390836588542data5.92866235429IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .data0x100000x12180x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x120000xc040x1000False0.265625data2.89090895296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x1235c0x8a8data
                RT_GROUP_ICON0x123480x14data
                RT_VERSION0x120f00x258dataEnglishUnited States

                Imports

                DLLImport
                MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaVarForInit, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, __vbaVarForNext, _CIexp, __vbaFreeStr, __vbaFreeObj

                Version Infos

                DescriptionData
                Translation0x0409 0x04b0
                InternalNameMuligheds
                FileVersion1.00
                CompanyNameLog
                ProductNameLog Inverter
                ProductVersion1.00
                FileDescriptionLog Inverter
                OriginalFilenameMuligheds.exe

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Feb 22, 2021 14:49:15.493716002 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.543536901 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.543644905 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.544481039 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.592736006 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.600081921 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.600111961 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.600132942 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.600152016 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.600202084 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.600253105 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.615720987 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.664360046 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.664455891 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.666582108 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.720733881 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.906469107 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.906512976 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.906533003 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.906547070 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.906555891 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.906579971 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.906580925 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.906610966 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.906740904 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.909709930 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.909739971 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.909794092 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.909820080 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.913100958 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.913132906 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.913207054 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.913233042 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.916501045 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.916532993 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.916570902 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.916600943 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.919878960 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.919908047 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.919945002 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.919977903 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.923264980 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.923302889 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.923363924 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.923382998 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.954972029 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.955013990 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.955054045 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.955082893 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.956590891 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.956629038 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.956655025 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.956672907 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.959994078 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.960026979 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.960057020 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.960078955 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.963354111 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.963383913 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.963427067 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.963448048 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.966733932 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.966764927 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.966814041 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.966837883 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.970132113 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.970159054 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.970196962 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.970216990 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.973546982 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.973586082 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.973664045 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.976944923 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.976983070 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.977034092 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.977066994 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.980299950 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.980382919 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.980411053 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.980427980 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.983366966 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.983428955 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.983433962 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.983473063 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.986465931 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.986524105 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.986545086 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.986572981 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.989459991 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.989506006 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.989536047 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.989561081 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.992543936 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.992568016 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.992599964 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.992621899 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.995641947 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.995666027 CET44349711142.250.186.33192.168.2.3
                Feb 22, 2021 14:49:15.995728016 CET49711443192.168.2.3142.250.186.33
                Feb 22, 2021 14:49:15.995748043 CET49711443192.168.2.3142.250.186.33

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Feb 22, 2021 14:48:13.800769091 CET5696153192.168.2.38.8.8.8
                Feb 22, 2021 14:48:13.852356911 CET53569618.8.8.8192.168.2.3
                Feb 22, 2021 14:48:14.570954084 CET5935353192.168.2.38.8.8.8
                Feb 22, 2021 14:48:14.619653940 CET53593538.8.8.8192.168.2.3
                Feb 22, 2021 14:48:19.542579889 CET5223853192.168.2.38.8.8.8
                Feb 22, 2021 14:48:19.591301918 CET53522388.8.8.8192.168.2.3
                Feb 22, 2021 14:48:20.510473013 CET4987353192.168.2.38.8.8.8
                Feb 22, 2021 14:48:20.569418907 CET53498738.8.8.8192.168.2.3
                Feb 22, 2021 14:48:22.318629980 CET5319653192.168.2.38.8.8.8
                Feb 22, 2021 14:48:22.367377996 CET53531968.8.8.8192.168.2.3
                Feb 22, 2021 14:48:23.215892076 CET5677753192.168.2.38.8.8.8
                Feb 22, 2021 14:48:23.264638901 CET53567778.8.8.8192.168.2.3
                Feb 22, 2021 14:48:24.478869915 CET5864353192.168.2.38.8.8.8
                Feb 22, 2021 14:48:24.528920889 CET53586438.8.8.8192.168.2.3
                Feb 22, 2021 14:48:25.919070005 CET6098553192.168.2.38.8.8.8
                Feb 22, 2021 14:48:25.968727112 CET53609858.8.8.8192.168.2.3
                Feb 22, 2021 14:48:26.884181023 CET5020053192.168.2.38.8.8.8
                Feb 22, 2021 14:48:26.933058977 CET53502008.8.8.8192.168.2.3
                Feb 22, 2021 14:48:27.879273891 CET5128153192.168.2.38.8.8.8
                Feb 22, 2021 14:48:27.931395054 CET53512818.8.8.8192.168.2.3
                Feb 22, 2021 14:48:28.981595039 CET4919953192.168.2.38.8.8.8
                Feb 22, 2021 14:48:29.065565109 CET53491998.8.8.8192.168.2.3
                Feb 22, 2021 14:48:30.168272018 CET5062053192.168.2.38.8.8.8
                Feb 22, 2021 14:48:30.225471020 CET53506208.8.8.8192.168.2.3
                Feb 22, 2021 14:48:31.040024996 CET6493853192.168.2.38.8.8.8
                Feb 22, 2021 14:48:31.091582060 CET53649388.8.8.8192.168.2.3
                Feb 22, 2021 14:48:32.091398001 CET6015253192.168.2.38.8.8.8
                Feb 22, 2021 14:48:32.143074036 CET53601528.8.8.8192.168.2.3
                Feb 22, 2021 14:48:33.367974997 CET5754453192.168.2.38.8.8.8
                Feb 22, 2021 14:48:33.416728973 CET53575448.8.8.8192.168.2.3
                Feb 22, 2021 14:48:39.860501051 CET5598453192.168.2.38.8.8.8
                Feb 22, 2021 14:48:39.912075996 CET53559848.8.8.8192.168.2.3
                Feb 22, 2021 14:48:40.733417988 CET6418553192.168.2.38.8.8.8
                Feb 22, 2021 14:48:40.782193899 CET53641858.8.8.8192.168.2.3
                Feb 22, 2021 14:48:48.915658951 CET6511053192.168.2.38.8.8.8
                Feb 22, 2021 14:48:48.982290983 CET53651108.8.8.8192.168.2.3
                Feb 22, 2021 14:49:09.404094934 CET5836153192.168.2.38.8.8.8
                Feb 22, 2021 14:49:09.452699900 CET53583618.8.8.8192.168.2.3
                Feb 22, 2021 14:49:14.425581932 CET6349253192.168.2.38.8.8.8
                Feb 22, 2021 14:49:14.490170002 CET53634928.8.8.8192.168.2.3
                Feb 22, 2021 14:49:15.423935890 CET6083153192.168.2.38.8.8.8
                Feb 22, 2021 14:49:15.490955114 CET53608318.8.8.8192.168.2.3

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Feb 22, 2021 14:49:15.423935890 CET192.168.2.38.8.8.80xa15bStandard query (0)doc-0c-58-docs.googleusercontent.comA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Feb 22, 2021 14:49:15.490955114 CET8.8.8.8192.168.2.30xa15bNo error (0)doc-0c-58-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                Feb 22, 2021 14:49:15.490955114 CET8.8.8.8192.168.2.30xa15bNo error (0)googlehosted.l.googleusercontent.com142.250.186.33A (IP address)IN (0x0001)

                HTTPS Packets

                TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                Feb 22, 2021 14:49:15.600152016 CET142.250.186.33443192.168.2.349711CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Jan 26 10:05:02 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Apr 20 11:05:01 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:14:48:21
                Start date:22/02/2021
                Path:C:\Users\user\Desktop\Muligheds.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\Muligheds.exe'
                Imagebase:0x400000
                File size:73728 bytes
                MD5 hash:4AA8881D2D0103703BD7301616CD8CAF
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Visual Basic
                Reputation:low

                General

                Start time:14:49:02
                Start date:22/02/2021
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\Muligheds.exe'
                Imagebase:0xe30000
                File size:64616 bytes
                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000008.00000002.469137619.0000000001211000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.474329596.000000001DEE1000.00000004.00000001.sdmp, Author: Joe Security
                Reputation:high

                General

                Start time:14:49:03
                Start date:22/02/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6b2800000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >