Loading ...

Play interactive tourEdit tour

Analysis Report GUEROLA INDUSTRIES N#U00ba de cuenta.exe

Overview

General Information

Sample Name:GUEROLA INDUSTRIES N#U00ba de cuenta.exe
Analysis ID:356269
MD5:9bca56d197da87e223e660316b3a48a0
SHA1:1950233071e9942921e9238bdf5c68c01182158c
SHA256:d30d1ebb4f2b3e74d4bef8630c51514337ce4f59fe393bc978534a5bdb06a1c2
Tags:ESPexegeoGuLoader

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected AgentTesla
Yara detected GuLoader
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • GUEROLA INDUSTRIES N#U00ba de cuenta.exe (PID: 7056 cmdline: 'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe' MD5: 9BCA56D197DA87E223E660316B3A48A0)
    • RegAsm.exe (PID: 3296 cmdline: 'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 5044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.908051944.0000000001201000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: RegAsm.exe PID: 3296JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 3296JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: GUEROLA INDUSTRIES N#U00ba de cuenta.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Uses secure TLS version for HTTPS connectionsShow sources
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.4:49746 version: TLS 1.2
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS traffic detected: queries for: doc-14-9s-docs.googleusercontent.com
            Source: RegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://MXXVzU.com
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: RegAsm.exe, 00000008.00000002.908488503.00000000015E5000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/d
            Source: RegAsm.exe, 00000008.00000002.908427204.000000000159F000.00000004.00000020.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpString found in binary or memory: https://doc-14-9s-docs.googleusercontent.com/
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpString found in binary or memory: https://doc-14-9s-docs.googleusercontent.com/U
            Source: RegAsm.exe, 00000008.00000002.908427204.000000000159F000.00000004.00000020.sdmp, RegAsm.exe, 00000008.00000002.908520125.00000000015FA000.00000004.00000020.sdmp, RegAsm.exe, 00000008.00000002.908488503.00000000015E5000.00000004.00000020.sdmpString found in binary or memory: https://doc-14-9s-docs.googleusercontent.com/docs/securesc/5ncffemq1843clkn140nheko96l7akee/3e4j78eu
            Source: RegAsm.exe, 00000008.00000002.908427204.000000000159F000.00000004.00000020.sdmpString found in binary or memory: https://docs.google.com/-
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: https://docs.google.com/nonceSigner?nonce=2faifmm8htnpk&continue=https://doc-14-9s-docs.googleuserco
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpString found in binary or memory: https://docs.google.com/p(
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/X(C
            Source: RegAsm.exeString found in binary or memory: https://drive.google.com/uc?export=download&id=1FAdfOdC9S1Rm2i8mXb_LPE-7X5DxuIBp
            Source: RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
            Source: RegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.4:49746 version: TLS 1.2
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeProcess Stats: CPU usage > 98%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0120548D NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_00401E3C
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_00401860
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_00401813
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_00401624
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1DB647A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1DB64773
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1DB6477D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1DB6475D
            Source: GUEROLA INDUSTRIES N#U00ba de cuenta.exe, 00000000.00000002.778980538.0000000000412000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLONDRES.exe vs GUEROLA INDUSTRIES N#U00ba de cuenta.exe
            Source: GUEROLA INDUSTRIES N#U00ba de cuenta.exeBinary or memory string: OriginalFilenameLONDRES.exe vs GUEROLA INDUSTRIES N#U00ba de cuenta.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
            Source: GUEROLA INDUSTRIES N#U00ba de cuenta.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal88.troj.evad.winEXE@4/0@1/1
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5044:120:WilError_01
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeFile created: C:\Users\user\AppData\Local\Temp\~DF8817D1ABED282CF3.TMPJump to behavior
            Source: GUEROLA INDUSTRIES N#U00ba de cuenta.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe 'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000008.00000002.908051944.0000000001201000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3296, type: MEMORY
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_004066A0 pushfd ; iretd
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_00404345 push ss; ret
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_0040414B pushad ; iretd
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_00405760 push ds; ret
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_004091F9 push cs; ret
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_00403FA1 push edx; iretd
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeCode function: 0_2_022543A5 push eax; retf
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeRDTSC instruction interceptor: First address: 0000000002252701 second address: 0000000002252701 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F9C58D19D38h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007F9C58D19D23h 0x00000026 push ecx 0x00000027 call 00007F9C58D19D5Ch 0x0000002c call 00007F9C58D19D48h 0x00000031 lfence 0x00000034 mov edx, dword ptr [7FFE0014h] 0x0000003a lfence 0x0000003d ret 0x0000003e mov esi, edx 0x00000040 pushad 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeRDTSC instruction interceptor: First address: 00000000022521C6 second address: 00000000022521C6 instructions:
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpBinary or memory string: ROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeRDTSC instruction interceptor: First address: 0000000002252701 second address: 0000000002252701 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F9C58D19D38h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 dec ecx 0x00000021 cmp ecx, 00000000h 0x00000024 jne 00007F9C58D19D23h 0x00000026 push ecx 0x00000027 call 00007F9C58D19D5Ch 0x0000002c call 00007F9C58D19D48h 0x00000031 lfence 0x00000034 mov edx, dword ptr [7FFE0014h] 0x0000003a lfence 0x0000003d ret 0x0000003e mov esi, edx 0x00000040 pushad 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeRDTSC instruction interceptor: First address: 00000000022528CB second address: 00000000022528CB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F9C58D26F22h 0x0000001d popad 0x0000001e call 00007F9C58D24B91h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeRDTSC instruction interceptor: First address: 00000000022521C6 second address: 00000000022521C6 instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 00000000012028CB second address: 00000000012028CB instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F9C58D26F22h 0x0000001d popad 0x0000001e call 00007F9C58D24B91h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01203B31 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1985
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 7837
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6960Thread sleep time: -23058430092136925s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpBinary or memory string: rogram Files\Qemu-ga\qemu-ga.exe
            Source: RegAsm.exe, 00000008.00000002.908427204.000000000159F000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWh
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01203B31 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01204124 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01204962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_012025A8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0120505C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1200000
            Source: C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe'
            Source: RegAsm.exe, 00000008.00000002.908708154.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000008.00000002.908708154.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000008.00000002.908708154.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000008.00000002.908708154.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_01204EF6 cpuid
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3296, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3296, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3296, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Process Injection112Virtualization/Sandbox Evasion34OS Credential DumpingSecurity Software Discovery631Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Disable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion34Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection112Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery323VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            GUEROLA INDUSTRIES N#U00ba de cuenta.exe4%ReversingLabs

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://MXXVzU.com0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://crl.pki.goog/GTS1O0%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
            http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
            http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
            http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
            http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
            http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
            http://ocsp.pki.goog/gsr2020%URL Reputationsafe
            http://ocsp.pki.goog/gsr2020%URL Reputationsafe
            http://ocsp.pki.goog/gsr2020%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe
            https://pki.goog/repository/00%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            googlehosted.l.googleusercontent.com
            142.250.186.33
            truefalse
              high
              doc-14-9s-docs.googleusercontent.com
              unknown
              unknownfalse
                high

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://MXXVzU.comRegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSRegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crl.pki.goog/GTS1ORegAsm.exe, 00000008.00000002.908488503.00000000015E5000.00000004.00000020.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://ocsp.pki.goog/gts1o1core0RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crl.pki.goog/GTS1O1core.crl0RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://doc-14-9s-docs.googleusercontent.com/URegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpfalse
                  high
                  http://pki.goog/gsr2/GTS1O1.crt0RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://crl.pki.goog/gsr2/gsr2.crl0?RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://ocsp.pki.goog/gsr202RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://pki.goog/repository/0RegAsm.exe, 00000008.00000002.908466549.00000000015BD000.00000004.00000020.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://doc-14-9s-docs.googleusercontent.com/docs/securesc/5ncffemq1843clkn140nheko96l7akee/3e4j78euRegAsm.exe, 00000008.00000002.908427204.000000000159F000.00000004.00000020.sdmp, RegAsm.exe, 00000008.00000002.908520125.00000000015FA000.00000004.00000020.sdmp, RegAsm.exe, 00000008.00000002.908488503.00000000015E5000.00000004.00000020.sdmpfalse
                    high
                    https://doc-14-9s-docs.googleusercontent.com/RegAsm.exe, 00000008.00000002.908256124.000000000154B000.00000004.00000020.sdmpfalse
                      high

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      142.250.186.33
                      unknownUnited States
                      15169GOOGLEUSfalse

                      General Information

                      Joe Sandbox Version:31.0.0 Emerald
                      Analysis ID:356269
                      Start date:22.02.2021
                      Start time:20:29:10
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 4s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:GUEROLA INDUSTRIES N#U00ba de cuenta.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:22
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal88.troj.evad.winEXE@4/0@1/1
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 8.8% (good quality ratio 6.5%)
                      • Quality average: 38.5%
                      • Quality standard deviation: 24.7%
                      HCA Information:
                      • Successful, ratio: 92%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .exe
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                      • TCP Packets have been reduced to 100
                      • Excluded IPs from analysis (whitelisted): 104.43.139.144, 204.79.197.200, 13.107.21.200, 13.107.5.88, 13.107.42.23, 23.57.81.29, 184.30.21.144, 104.42.151.234, 13.64.90.137, 51.11.168.160, 92.122.213.247, 92.122.213.194, 205.185.216.10, 205.185.216.42, 142.250.74.206, 216.58.212.142, 51.104.139.180, 52.155.217.156, 20.54.26.129
                      • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, docs.google.com, client-office365-tas.msedge.net, ocos-office365-s2s.msedge.net, arc.msn.com.nsatc.net, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, e-0009.e-msedge.net, config-edge-skype.l-0014.l-msedge.net, l-0014.config.skype.com, a1449.dscg2.akamai.net, storeedgefd.xbetservices.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, config.edge.skype.com, au-bg-shim.trafficmanager.net, storeedgefd.dsx.mp.microsoft.com, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, afdo-tas-offload.trafficmanager.net, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, cds.d2s7q6s2.hwcdn.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, l-0014.l-msedge.net, e16646.dscg.akamaiedge.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: /opt/package/joesandbox/database/analysis/356269/sample/GUEROLA INDUSTRIES N#U00ba de cuenta.exe

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      20:31:06API Interceptor401x Sleep call for process: RegAsm.exe modified

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      142.250.186.33xerox for hycite.htmGet hashmaliciousBrowse
                        Muligheds.exeGet hashmaliciousBrowse

                          Domains

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          googlehosted.l.googleusercontent.comxerox for hycite.htmGet hashmaliciousBrowse
                          • 142.250.186.33
                          Muligheds.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          2021-Nouvelle masse salariale-Rapport.htmlGet hashmaliciousBrowse
                          • 216.58.209.33
                          SOLICITUD DE HERJIMAR, SL (HJM-745022821).exeGet hashmaliciousBrowse
                          • 216.58.208.161
                          #U6211#U662f#U56fe#U7247.exeGet hashmaliciousBrowse
                          • 216.58.208.161
                          OneNote rmos@dataflex-int.com.htmlGet hashmaliciousBrowse
                          • 216.58.208.129
                          Sponsor A Child, Best Online Donation Site, Top NGO - World Vision India.htmlGet hashmaliciousBrowse
                          • 172.217.20.225
                          barcelona-v-psg-liv-uefa-2021.htmlGet hashmaliciousBrowse
                          • 172.217.20.225
                          Barcelona-v-PSG-0tv.htmlGet hashmaliciousBrowse
                          • 172.217.20.225
                          CONSTRUCCIONES SAN MART#U00cdN, S.A. SOLICITAR. (SMT-14517022021).exeGet hashmaliciousBrowse
                          • 172.217.20.225
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.208.161
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.208.161
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.208.161
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.208.161
                          OEVGVSOGAH.dllGet hashmaliciousBrowse
                          • 216.58.206.65
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.206.65
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.206.65
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.206.65
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.206.65
                          executable.908.exeGet hashmaliciousBrowse
                          • 216.58.206.65

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          GOOGLEUSDHL eInvoice_Pdf.exeGet hashmaliciousBrowse
                          • 34.102.136.180
                          AWB-INVOICE_PDF.exeGet hashmaliciousBrowse
                          • 34.102.136.180
                          xerox for hycite.htmGet hashmaliciousBrowse
                          • 142.250.186.33
                          rad875FE.tmp.exeGet hashmaliciousBrowse
                          • 34.102.136.180
                          SecuriteInfo.com.Trojan.Inject4.6572.17143.exeGet hashmaliciousBrowse
                          • 34.102.136.180
                          IMG_61061_SCANNED.docGet hashmaliciousBrowse
                          • 35.200.172.247
                          X1(1).xlsmGet hashmaliciousBrowse
                          • 142.250.186.66
                          IMG_6078_SCANNED.docGet hashmaliciousBrowse
                          • 35.200.172.247
                          fedex.apkGet hashmaliciousBrowse
                          • 142.250.186.138
                          Muligheds.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          X1(1).xlsmGet hashmaliciousBrowse
                          • 142.250.186.66
                          DHL Document. PDF.exeGet hashmaliciousBrowse
                          • 34.102.136.180
                          ydQ0ICWj5v.exeGet hashmaliciousBrowse
                          • 35.228.227.140
                          r4yGYPyWb7.exeGet hashmaliciousBrowse
                          • 35.228.227.140
                          X1(1).xlsmGet hashmaliciousBrowse
                          • 142.250.186.66
                          aif9fEvN5g.exeGet hashmaliciousBrowse
                          • 35.228.227.140
                          IMG_01670_Scanned.docGet hashmaliciousBrowse
                          • 35.200.172.247
                          eInvoice.exeGet hashmaliciousBrowse
                          • 34.102.136.180
                          IMG_7742_Scanned.docGet hashmaliciousBrowse
                          • 34.102.136.180
                          SWIFT Payment W0301.docGet hashmaliciousBrowse
                          • 35.200.172.247

                          JA3 Fingerprints

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          37f463bf4616ecd445d4a1937da06e19receipt145.htmGet hashmaliciousBrowse
                          • 142.250.186.33
                          xerox for hycite.htmGet hashmaliciousBrowse
                          • 142.250.186.33
                          SecuriteInfo.com.Heur.15528.xlsGet hashmaliciousBrowse
                          • 142.250.186.33
                          Muligheds.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          DHL_6368638172 documento de recibo,pdf.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          PDF.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          pagamento.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          message_zdm (2).htmlGet hashmaliciousBrowse
                          • 142.250.186.33
                          Statement-ID28865611496334.vbsGet hashmaliciousBrowse
                          • 142.250.186.33
                          Statement-ID21488878391791.vbsGet hashmaliciousBrowse
                          • 142.250.186.33
                          frank_2021-02-22_02-03.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          Statement-ID72347595684775.vbsGet hashmaliciousBrowse
                          • 142.250.186.33
                          MR52.vbsGet hashmaliciousBrowse
                          • 142.250.186.33
                          Scan_medcal equipment sample_pdf.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          rfq02212021.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          RE ICA 40 Sdn Bhd- Purchase Order#6769704.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          RFQ-#09503.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          RFQ_1101983736366355 1101938377388.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          Offer Request 6100003768.exeGet hashmaliciousBrowse
                          • 142.250.186.33
                          124992436.docxGet hashmaliciousBrowse
                          • 142.250.186.33

                          Dropped Files

                          No context

                          Created / dropped Files

                          No created / dropped files found

                          Static File Info

                          General

                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):5.514109730917141
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.15%
                          • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:GUEROLA INDUSTRIES N#U00ba de cuenta.exe
                          File size:73728
                          MD5:9bca56d197da87e223e660316b3a48a0
                          SHA1:1950233071e9942921e9238bdf5c68c01182158c
                          SHA256:d30d1ebb4f2b3e74d4bef8630c51514337ce4f59fe393bc978534a5bdb06a1c2
                          SHA512:0263c372b2ddc417dda8e176b4397965a7d5e8ae3b2c011123be3145ad21273e7d765d1ecb5914a1725f2cf324ba4ba8bc27ca9bae9b789809cd2d0881355659
                          SSDEEP:768:zIRDN3RKfu2EuliepSkunQgrky77t3qPHxpA5Ci03RZZe1KYZNI/k/GD:kRD+zQWCQgbNqfxiUi03RZZe1KY/ZGD
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.......................D.......=.......Rich............PE..L...qb.R.....................0....................@................

                          File Icon

                          Icon Hash:1e74f2ea62e4a082

                          Static PE Info

                          General

                          Entrypoint:0x401494
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                          DLL Characteristics:
                          Time Stamp:0x52D66271 [Wed Jan 15 10:26:57 2014 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:b84199caadebcbcd5f63d7b7de7ff518

                          Entrypoint Preview

                          Instruction
                          push 0040A258h
                          call 00007F9C58B091D3h
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          xor byte ptr [eax], al
                          add byte ptr [eax], al
                          dec eax
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [ecx+eax*8+27h], bh
                          dec eax
                          aam 23h
                          add al, byte ptr [edi-7Ch]
                          push ecx
                          wait
                          adc esp, dword ptr [ecx]
                          adc eax, 00005A4Eh
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add dword ptr [eax], eax
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          dec ecx
                          outsb
                          arpl word ptr fs:[edi+72h], bp
                          outsd
                          jne 00007F9C58B09255h
                          outsb
                          jnc 00007F9C58B09256h
                          jnc 00007F9C58B09215h
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add bh, bh
                          int3
                          xor dword ptr [eax], eax
                          or dword ptr [esi+edi*8+155F6A61h], esi
                          lodsb
                          inc ebx
                          movsd
                          inc esp
                          std
                          pop ebp

                          Data Directories

                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xf2e40x28.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000xbfc.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x150.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                          Sections

                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000xe8840xf000False0.401302083333data6.05504586492IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          .data0x100000x12180x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                          .rsrc0x120000xbfc0x1000False0.26416015625data2.88799096986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                          Resources

                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x123540x8a8data
                          RT_GROUP_ICON0x123400x14data
                          RT_VERSION0x120f00x250dataEnglishUnited States

                          Imports

                          DLLImport
                          MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaVarForInit, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, __vbaVarForNext, _CIexp, __vbaFreeStr, __vbaFreeObj

                          Version Infos

                          DescriptionData
                          Translation0x0409 0x04b0
                          InternalNameLONDRES
                          FileVersion1.00
                          CompanyNameLog
                          ProductNameLog Inverter
                          ProductVersion1.00
                          FileDescriptionLog Inverter
                          OriginalFilenameLONDRES.exe

                          Possible Origin

                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States

                          Network Behavior

                          Network Port Distribution

                          TCP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Feb 22, 2021 20:30:57.104084015 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.152667999 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.152837038 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.153913975 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.203562975 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.210624933 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.210671902 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.210695028 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.210716963 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.210891008 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.210935116 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.226625919 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.277502060 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.278716087 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.280087948 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.335387945 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.447724104 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.447765112 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.447792053 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.447814941 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:57.447855949 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.447882891 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.818649054 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:57.866982937 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.070207119 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.070234060 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.070322990 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.076669931 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.076692104 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.076822042 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.077136993 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.077153921 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.077188015 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.077244997 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.079497099 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.079516888 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.079628944 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.084424973 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.084456921 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.084589005 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.085717916 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.085742950 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.085849047 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.088488102 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.088505030 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.088644028 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.091310024 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.091351986 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.091415882 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.091468096 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.094824076 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.094844103 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.094989061 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.098319054 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.098428011 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.120646000 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.120671034 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.120687962 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.120706081 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.120729923 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.120764971 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.125104904 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.125129938 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.125215054 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.127289057 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.127312899 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.127397060 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.130852938 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.130876064 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.130954027 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.130975962 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.134303093 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.134330988 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.134457111 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.137773037 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.137793064 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.137840986 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.137862921 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.141308069 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.141338110 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.141469955 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.144807100 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.144834995 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.144947052 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.148130894 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.148149967 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.148216009 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.151192904 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.151213884 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.151249886 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.151277065 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.154017925 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.154041052 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.154134035 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.156864882 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.156887054 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.156996965 CET49746443192.168.2.4142.250.186.33
                          Feb 22, 2021 20:30:58.159661055 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.159683943 CET44349746142.250.186.33192.168.2.4
                          Feb 22, 2021 20:30:58.159765005 CET49746443192.168.2.4142.250.186.33

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Feb 22, 2021 20:29:47.866862059 CET5745853192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:47.893109083 CET5057953192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:47.918524981 CET53574588.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:47.947249889 CET53505798.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:48.806946993 CET5170353192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:48.855660915 CET53517038.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:49.241359949 CET6524853192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:49.242655039 CET5372353192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:49.243561983 CET6464653192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:49.352312088 CET53652488.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:49.365633011 CET53646468.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:49.365755081 CET53537238.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:49.851952076 CET6529853192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:49.909699917 CET53652988.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:50.189769983 CET5912353192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:50.253238916 CET53591238.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:50.486682892 CET5453153192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:50.551767111 CET53545318.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:50.778696060 CET4971453192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:50.827613115 CET53497148.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:52.172200918 CET5802853192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:52.221365929 CET53580288.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:53.504038095 CET5309753192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:53.555516958 CET53530978.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:54.767472982 CET4925753192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:54.816823006 CET53492578.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:56.352571011 CET6238953192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:56.413671970 CET53623898.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:57.820853949 CET4991053192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:57.869788885 CET53499108.8.8.8192.168.2.4
                          Feb 22, 2021 20:29:59.239883900 CET5585453192.168.2.48.8.8.8
                          Feb 22, 2021 20:29:59.299640894 CET53558548.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:00.236426115 CET6454953192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:00.289377928 CET53645498.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:01.435159922 CET6315353192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:01.483860016 CET53631538.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:03.507889986 CET5299153192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:03.557085991 CET53529918.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:04.694171906 CET5370053192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:04.745728970 CET53537008.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:09.004453897 CET5172653192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:09.057030916 CET53517268.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:14.945185900 CET5679453192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:14.993709087 CET53567948.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:16.050041914 CET5653453192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:16.107153893 CET53565348.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:17.195919991 CET5662753192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:17.247493982 CET53566278.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:18.588977098 CET5662153192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:18.637809992 CET53566218.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:21.004780054 CET6311653192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:21.053427935 CET53631168.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:25.945535898 CET6407853192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:26.006371975 CET53640788.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:42.163717031 CET6480153192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:42.212616920 CET53648018.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:56.181653976 CET6172153192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:56.248737097 CET53617218.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:57.030400038 CET5125553192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:57.098644018 CET53512558.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:57.458235979 CET6152253192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:57.528398037 CET53615228.8.8.8192.168.2.4
                          Feb 22, 2021 20:30:57.949670076 CET5233753192.168.2.48.8.8.8
                          Feb 22, 2021 20:30:58.001070976 CET53523378.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:08.427495003 CET5504653192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:08.486000061 CET53550468.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:22.894288063 CET4961253192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:22.942935944 CET53496128.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:23.491307974 CET4928553192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:23.551033020 CET53492858.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:24.125593901 CET5060153192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:24.182749033 CET53506018.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:24.666773081 CET6087553192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:24.715358973 CET53608758.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:24.744188070 CET5644853192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:24.811337948 CET53564488.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:25.207520008 CET5917253192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:25.272049904 CET53591728.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:25.877005100 CET6242053192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:25.934243917 CET53624208.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:26.578605890 CET6057953192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:26.628770113 CET53605798.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:27.448235989 CET5018353192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:27.507504940 CET53501838.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:28.631377935 CET6153153192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:28.692471027 CET53615318.8.8.8192.168.2.4
                          Feb 22, 2021 20:31:29.393434048 CET4922853192.168.2.48.8.8.8
                          Feb 22, 2021 20:31:29.452748060 CET53492288.8.8.8192.168.2.4

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Feb 22, 2021 20:30:57.030400038 CET192.168.2.48.8.8.80xe44aStandard query (0)doc-14-9s-docs.googleusercontent.comA (IP address)IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Feb 22, 2021 20:30:57.098644018 CET8.8.8.8192.168.2.40xe44aNo error (0)doc-14-9s-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                          Feb 22, 2021 20:30:57.098644018 CET8.8.8.8192.168.2.40xe44aNo error (0)googlehosted.l.googleusercontent.com142.250.186.33A (IP address)IN (0x0001)

                          HTTPS Packets

                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                          Feb 22, 2021 20:30:57.210716963 CET142.250.186.33443192.168.2.449746CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Jan 26 10:05:02 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Apr 20 11:05:01 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                          CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:20:29:54
                          Start date:22/02/2021
                          Path:C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe'
                          Imagebase:0x400000
                          File size:73728 bytes
                          MD5 hash:9BCA56D197DA87E223E660316B3A48A0
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:Visual Basic
                          Reputation:low

                          General

                          Start time:20:30:45
                          Start date:22/02/2021
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\Desktop\GUEROLA INDUSTRIES N#U00ba de cuenta.exe'
                          Imagebase:0xdf0000
                          File size:64616 bytes
                          MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000008.00000002.908051944.0000000001201000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.911956982.000000001DCC1000.00000004.00000001.sdmp, Author: Joe Security
                          Reputation:high

                          General

                          Start time:20:30:46
                          Start date:22/02/2021
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff724c50000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Disassembly

                          Code Analysis

                          Reset < >