Loading ...

Play interactive tourEdit tour

Analysis Report LIZvq3EW7m.exe

Overview

General Information

Sample Name:LIZvq3EW7m.exe
Analysis ID:357559
MD5:5d2d34449323c67ba1f5ec7561df2204
SHA1:a48c7f51db44ca8a2b0240d9c57c1983ac5d75dd
SHA256:95a1ff3f5d08ac3d0dfe64300eec668fa0c78bdb7da395f1d91735c5a0aef8a5
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • LIZvq3EW7m.exe (PID: 6288 cmdline: 'C:\Users\user\Desktop\LIZvq3EW7m.exe' MD5: 5D2D34449323C67BA1F5EC7561DF2204)
    • RegAsm.exe (PID: 6728 cmdline: 'C:\Users\user\Desktop\LIZvq3EW7m.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 4632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000E.00000002.510534238.0000000000B42000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
        Process Memory Space: RegAsm.exe PID: 6728JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 6728JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: LIZvq3EW7m.exeVirustotal: Detection: 21%Perma Link
            Source: LIZvq3EW7m.exeReversingLabs: Detection: 16%

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: LIZvq3EW7m.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Uses new MSVCR DllsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: unknownDNS traffic detected: queries for: onedrive.live.com
            Source: RegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpString found in binary or memory: http://JSQBKI.com
            Source: RegAsm.exe, 0000000E.00000002.510950928.0000000000F7D000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: RegAsm.exe, 0000000E.00000002.510950928.0000000000F7D000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: RegAsm.exe, 0000000E.00000002.510950928.0000000000F7D000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: RegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
            Source: RegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpString found in binary or memory: https://cbzrfq.bl.files.1drv.com/X
            Source: RegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpString found in binary or memory: https://cbzrfq.bl.files.1drv.com/t
            Source: RegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpString found in binary or memory: https://cbzrfq.bl.files.1drv.com/y4m6xg1XvMW3gbVxDaG8eC-sQOlr6nmG4uqhmYHacvOjJxUricSauwypPs7Fa6xUXOy
            Source: RegAsm.exe, 0000000E.00000002.510930369.0000000000F5E000.00000004.00000020.sdmpString found in binary or memory: https://cbzrfq.bl.files.1drv.com/y4meC4ccKelBPgeKSh6hZT6bRCOR5ff4nvnt28NLuAcRP3PcWBKUwkBGKN3LJUa7F0I
            Source: RegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/B
            Source: RegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/R
            Source: RegAsm.exeString found in binary or memory: https://onedrive.live.com/download?cid=F57CEB019EB26E7D&resid=F57CEB019EB26E7D%21108&authkey=AN1oxHG
            Source: RegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeProcess Stats: CPU usage > 98%
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46AA5 NtProtectVirtualMemory,NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46F2E LoadLibraryA,NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B470B2 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B47097 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B47081 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B470C9 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B47013 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B47007 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B4705C NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B471A9 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B47190 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B471F7 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B471DE NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B4710B NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B4717A NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B47151 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B4729D NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46AF6 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46AC7 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B4720F NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46A5F NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46B15 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46E84 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46FBD NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46FA1 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46FD8 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46F75 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46F47 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_1D6BB0BA NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_1D6BB089 NtQuerySystemInformation,
            Source: LIZvq3EW7m.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: LIZvq3EW7m.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: LIZvq3EW7m.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: LIZvq3EW7m.exe, 00000001.00000000.245490360.0000000000417000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameudfrlig.exe vs LIZvq3EW7m.exe
            Source: LIZvq3EW7m.exeBinary or memory string: OriginalFilenameudfrlig.exe vs LIZvq3EW7m.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
            Source: LIZvq3EW7m.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal96.troj.evad.winEXE@4/0@2/0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_1D6BAF3E AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_1D6BAF07 AdjustTokenPrivileges,
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4632:120:WilError_01
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeFile created: C:\Users\user\AppData\Local\Temp\~DF5FD0B92EB3573A4E.TMPJump to behavior
            Source: LIZvq3EW7m.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: LIZvq3EW7m.exeVirustotal: Detection: 21%
            Source: LIZvq3EW7m.exeReversingLabs: Detection: 16%
            Source: unknownProcess created: C:\Users\user\Desktop\LIZvq3EW7m.exe 'C:\Users\user\Desktop\LIZvq3EW7m.exe'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\LIZvq3EW7m.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\LIZvq3EW7m.exe'
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 0000000E.00000002.510534238.0000000000B42000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6728, type: MEMORY
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 0000000000463918 second address: 0000000000463918 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FE178CB36F8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007FE178CB3702h 0x0000001f cmp bx, bx 0x00000022 cmp bx, dx 0x00000025 pop ecx 0x00000026 add edi, edx 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007FE178CB36C7h 0x0000002e cmp ah, bh 0x00000030 test cl, dl 0x00000032 push ecx 0x00000033 call 00007FE178CB3779h 0x00000038 call 00007FE178CB3708h 0x0000003d lfence 0x00000040 mov edx, dword ptr [7FFE0014h] 0x00000046 lfence 0x00000049 ret 0x0000004a mov esi, edx 0x0000004c pushad 0x0000004d rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 00000000004638DF second address: 0000000000463B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007FE178BD29D2h 0x0000000c pushad 0x0000000d mov bx, 2AB1h 0x00000011 cmp bx, 2AB1h 0x00000016 jne 00007FE178BCF536h 0x0000001c popad 0x0000001d ret 0x0000001e jmp 00007FE178BD29D2h 0x00000020 test dx, ax 0x00000023 jmp 00007FE178BD29D2h 0x00000025 cmp eax, edx 0x00000027 jmp 00007FE178BD29D2h 0x00000029 test bl, bl 0x0000002b jmp 00007FE178BD29D2h 0x0000002d test dh, dh 0x0000002f mov dword ptr [ebp+0000009Ch], 00000000h 0x00000039 jmp 00007FE178BD29D2h 0x0000003b test bx, ax 0x0000003e xor edi, edi 0x00000040 jmp 00007FE178BD29D2h 0x00000042 test bl, 00000069h 0x00000045 mov ecx, 000186A0h 0x0000004a jmp 00007FE178BD29D2h 0x0000004c test dx, ax 0x0000004f jmp 00007FE178BD29D2h 0x00000051 cmp eax, edx 0x00000053 test dx, cx 0x00000056 cmp bx, dx 0x00000059 push ecx 0x0000005a call 00007FE178BD2A62h 0x0000005f call 00007FE178BD2A22h 0x00000064 lfence 0x00000067 rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 0000000000463A7D second address: 0000000000463B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test cl, 00000016h 0x0000000d add dword ptr [ebp+0000009Ch], 01h 0x00000014 jmp 00007FE178BD29D2h 0x00000016 test eax, ecx 0x00000018 add edi, edx 0x0000001a dec ecx 0x0000001b cmp ecx, 00000000h 0x0000001e jne 00007FE178BD2959h 0x00000020 cmp bx, dx 0x00000023 push ecx 0x00000024 call 00007FE178BD2A62h 0x00000029 call 00007FE178BD2A22h 0x0000002e lfence 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 0000000000463473 second address: 0000000000465189 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007FE178BD29D2h 0x0000000c test ch, ah 0x0000000e jmp 00007FE178BD4110h 0x00000013 call 00007FE178BD1277h 0x00000018 pop eax 0x00000019 cmp ax, dx 0x0000001c push edi 0x0000001d push eax 0x0000001e call 00007FE178BD4693h 0x00000023 jmp 00007FE178BD29D2h 0x00000025 pushad 0x00000026 mov ebx, 000000ACh 0x0000002b rdtsc
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 0000000000463918 second address: 0000000000463918 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FE178CB36F8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007FE178CB3702h 0x0000001f cmp bx, bx 0x00000022 cmp bx, dx 0x00000025 pop ecx 0x00000026 add edi, edx 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007FE178CB36C7h 0x0000002e cmp ah, bh 0x00000030 test cl, dl 0x00000032 push ecx 0x00000033 call 00007FE178CB3779h 0x00000038 call 00007FE178CB3708h 0x0000003d lfence 0x00000040 mov edx, dword ptr [7FFE0014h] 0x00000046 lfence 0x00000049 ret 0x0000004a mov esi, edx 0x0000004c pushad 0x0000004d rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 00000000004638DF second address: 0000000000463B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007FE178BD29D2h 0x0000000c pushad 0x0000000d mov bx, 2AB1h 0x00000011 cmp bx, 2AB1h 0x00000016 jne 00007FE178BCF536h 0x0000001c popad 0x0000001d ret 0x0000001e jmp 00007FE178BD29D2h 0x00000020 test dx, ax 0x00000023 jmp 00007FE178BD29D2h 0x00000025 cmp eax, edx 0x00000027 jmp 00007FE178BD29D2h 0x00000029 test bl, bl 0x0000002b jmp 00007FE178BD29D2h 0x0000002d test dh, dh 0x0000002f mov dword ptr [ebp+0000009Ch], 00000000h 0x00000039 jmp 00007FE178BD29D2h 0x0000003b test bx, ax 0x0000003e xor edi, edi 0x00000040 jmp 00007FE178BD29D2h 0x00000042 test bl, 00000069h 0x00000045 mov ecx, 000186A0h 0x0000004a jmp 00007FE178BD29D2h 0x0000004c test dx, ax 0x0000004f jmp 00007FE178BD29D2h 0x00000051 cmp eax, edx 0x00000053 test dx, cx 0x00000056 cmp bx, dx 0x00000059 push ecx 0x0000005a call 00007FE178BD2A62h 0x0000005f call 00007FE178BD2A22h 0x00000064 lfence 0x00000067 rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 0000000000463B4F second address: 0000000000463B4F instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FE178CB59F7h 0x0000001d popad 0x0000001e call 00007FE178CB373Ah 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 0000000000463A7D second address: 0000000000463B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test cl, 00000016h 0x0000000d add dword ptr [ebp+0000009Ch], 01h 0x00000014 jmp 00007FE178BD29D2h 0x00000016 test eax, ecx 0x00000018 add edi, edx 0x0000001a dec ecx 0x0000001b cmp ecx, 00000000h 0x0000001e jne 00007FE178BD2959h 0x00000020 cmp bx, dx 0x00000023 push ecx 0x00000024 call 00007FE178BD2A62h 0x00000029 call 00007FE178BD2A22h 0x0000002e lfence 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 000000000046534E second address: 000000000046534E instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov dx, word ptr [esi+ecx] 0x0000000f jmp 00007FE178CB3702h 0x00000011 test dh, 00000068h 0x00000014 cmp bx, dx 0x00000017 jne 00007FE178CB3663h 0x0000001d push dword ptr [esp+04h] 0x00000021 jmp 00007FE178CB3702h 0x00000023 test bx, ax 0x00000026 call 00007FE178CB3925h 0x0000002b mov ebx, dword ptr [esp+04h] 0x0000002f xor ecx, ecx 0x00000031 add ecx, 02h 0x00000034 cmp word ptr [ebx+ecx], 0000h 0x00000039 jne 00007FE178CB36E8h 0x0000003b add ecx, 02h 0x0000003e cmp word ptr [ebx+ecx], 0000h 0x00000043 jne 00007FE178CB36E8h 0x00000045 add ecx, 02h 0x00000048 cmp word ptr [ebx+ecx], 0000h 0x0000004d jne 00007FE178CB36E8h 0x0000004f add ecx, 02h 0x00000052 cmp word ptr [ebx+ecx], 0000h 0x00000057 jne 00007FE178CB36E8h 0x00000059 add ecx, 02h 0x0000005c cmp word ptr [ebx+ecx], 0000h 0x00000061 jne 00007FE178CB36E8h 0x00000063 add ecx, 02h 0x00000066 cmp word ptr [ebx+ecx], 0000h 0x0000006b jne 00007FE178CB36E8h 0x0000006d add ecx, 02h 0x00000070 cmp word ptr [ebx+ecx], 0000h 0x00000075 jne 00007FE178CB36E8h 0x00000077 retn 0004h 0x0000007a jmp 00007FE178CB3702h 0x0000007c cmp dh, dh 0x0000007e sub ecx, 02h 0x00000081 add eax, 02h 0x00000084 jmp 00007FE178CB3702h 0x00000086 cmp dl, cl 0x00000088 mov bx, word ptr [eax+ecx] 0x0000008c jmp 00007FE178CB3702h 0x0000008e pushad 0x0000008f lfence 0x00000092 rdtsc
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeRDTSC instruction interceptor: First address: 0000000000463473 second address: 0000000000465189 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007FE178BD29D2h 0x0000000c test ch, ah 0x0000000e jmp 00007FE178BD4110h 0x00000013 call 00007FE178BD1277h 0x00000018 pop eax 0x00000019 cmp ax, dx 0x0000001c push edi 0x0000001d push eax 0x0000001e call 00007FE178BD4693h 0x00000023 jmp 00007FE178BD29D2h 0x00000025 pushad 0x00000026 mov ebx, 000000ACh 0x0000002b rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000B43B4F second address: 0000000000B43B4F instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FE178CB59F7h 0x0000001d popad 0x0000001e call 00007FE178CB373Ah 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B43831 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5412Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5412Thread sleep time: -4110000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5412Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RegAsm.exe, 0000000E.00000002.516070972.000000001FE30000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: RegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWp
            Source: RegAsm.exe, 0000000E.00000002.510930369.0000000000F5E000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: RegAsm.exe, 0000000E.00000002.516070972.000000001FE30000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: RegAsm.exe, 0000000E.00000002.516070972.000000001FE30000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: RegAsm.exe, 0000000E.00000002.516070972.000000001FE30000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B43831 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B459F0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46499 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46432 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B4643D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B4640D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46477 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B46451 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B455CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B436C3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: B40000
            Source: C:\Users\user\Desktop\LIZvq3EW7m.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\LIZvq3EW7m.exe'
            Source: RegAsm.exe, 0000000E.00000002.511467433.00000000013D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 0000000E.00000002.511467433.00000000013D0000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 0000000E.00000002.511467433.00000000013D0000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
            Source: RegAsm.exe, 0000000E.00000002.511467433.00000000013D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
            Source: RegAsm.exe, 0000000E.00000002.511467433.00000000013D0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 14_2_00B438F9 cpuid
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6728, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6728, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6728, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Access Token Manipulation1Virtualization/Sandbox Evasion34OS Credential DumpingSecurity Software Discovery631Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion34Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Access Token Manipulation1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSSystem Information Discovery323Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            LIZvq3EW7m.exe21%VirustotalBrowse
            LIZvq3EW7m.exe17%ReversingLabsWin32.Trojan.Razy

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://JSQBKI.com0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            onedrive.live.com
            unknown
            unknownfalse
              high
              cbzrfq.bl.files.1drv.com
              unknown
              unknownfalse
                high

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://onedrive.live.com/BRegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpfalse
                  high
                  https://onedrive.live.com/RRegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpfalse
                    high
                    http://127.0.0.1:HTTP/1.1RegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    https://api.ipify.org%GETMozilla/5.0RegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    low
                    http://DynDns.comDynDNSRegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://cbzrfq.bl.files.1drv.com/tRegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpfalse
                      high
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://JSQBKI.comRegAsm.exe, 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://cbzrfq.bl.files.1drv.com/y4m6xg1XvMW3gbVxDaG8eC-sQOlr6nmG4uqhmYHacvOjJxUricSauwypPs7Fa6xUXOyRegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpfalse
                        high
                        https://onedrive.live.com/download?cid=F57CEB019EB26E7D&resid=F57CEB019EB26E7D%21108&authkey=AN1oxHGRegAsm.exefalse
                          high
                          https://cbzrfq.bl.files.1drv.com/XRegAsm.exe, 0000000E.00000002.510872582.0000000000F1B000.00000004.00000020.sdmpfalse
                            high
                            https://cbzrfq.bl.files.1drv.com/y4meC4ccKelBPgeKSh6hZT6bRCOR5ff4nvnt28NLuAcRP3PcWBKUwkBGKN3LJUa7F0IRegAsm.exe, 0000000E.00000002.510930369.0000000000F5E000.00000004.00000020.sdmpfalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:357559
                              Start date:24.02.2021
                              Start time:18:35:39
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 5m 33s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:LIZvq3EW7m.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:23
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal96.troj.evad.winEXE@4/0@2/0
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 90%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 13.88.21.125, 104.42.151.234, 13.64.90.137, 168.61.161.212, 184.30.24.56, 52.255.188.83, 23.211.6.115, 51.104.146.109, 51.103.5.186, 92.122.213.194, 92.122.213.247, 51.104.139.180, 13.107.42.13, 13.107.42.12, 20.54.26.129
                              • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, l-0004.l-msedge.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, odc-bl-files-brs.onedrive.akadns.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, odc-bl-files-geo.onedrive.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              18:38:20API Interceptor199x Sleep call for process: RegAsm.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              No created / dropped files found

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):4.79650156443488
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.15%
                              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:LIZvq3EW7m.exe
                              File size:131072
                              MD5:5d2d34449323c67ba1f5ec7561df2204
                              SHA1:a48c7f51db44ca8a2b0240d9c57c1983ac5d75dd
                              SHA256:95a1ff3f5d08ac3d0dfe64300eec668fa0c78bdb7da395f1d91735c5a0aef8a5
                              SHA512:28b4c6df609084045f866686e559c7771b6455bc8fde56942f9422265c6ed2acfe12ef383c23225ad171d9d7ba22efc9ef7137c069070812af798edaa8ae6d73
                              SSDEEP:1536:HWWTwV4fVhuy/kysvxhG7NuX40vbyovaWm5vj2kht/uxVQwV4MjW:7wVUPsyChtX40Tyova75vj2mt/QqwV
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L...n\RK.................P...................`....@................

                              File Icon

                              Icon Hash:01d292796dda0080

                              Static PE Info

                              General

                              Entrypoint:0x4013dc
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                              DLL Characteristics:
                              Time Stamp:0x4B525C6E [Sun Jan 17 00:40:14 2010 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:cc882d101998a701353b40b0cd8c341a

                              Entrypoint Preview

                              Instruction
                              push 00412024h
                              call 00007FE178CB4923h
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              xor byte ptr [eax], al
                              add byte ptr [eax], al
                              inc eax
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add cl, bl
                              dec esi
                              aad 21h
                              nop
                              pop ebp
                              inc ebp
                              inc ecx
                              sub byte ptr [ebx+76h], FFFFFF80h
                              mov edi, 0045384Ch
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [ecx], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax+eax], al
                              add byte ptr [eax], al
                              inc edx
                              inc ebp
                              dec esi
                              inc edi
                              dec esp
                              inc ebp
                              push edx
                              push ebx
                              add byte ptr [eax+00000059h], ah
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              dec esp
                              xor dword ptr [eax], eax
                              add al, 32h
                              int 5Ah
                              je 00007FE178CB48D5h
                              sbb eax, dword ptr [edi+41h]
                              mov eax, 337E19C3h
                              mov dword ptr [D3AAF464h], eax
                              pop ebp
                              nop
                              outsb
                              out dx, al
                              aad 47h
                              mov ah, 46h
                              sub dword ptr [eax+5Eh], 3A62DA2Dh
                              dec edi
                              lodsd
                              xor ebx, dword ptr [ecx-48EE309Ah]
                              or al, 00h
                              stosb
                              add byte ptr [eax-2Dh], ah
                              xchg eax, ebx
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              inc ebp
                              or eax, dword ptr [ecx]
                              add byte ptr [edx+0000007Fh], bl
                              sldt word ptr [esi+79h]
                              jc 00007FE178CB499Bh
                              outsb
                              jnc 00007FE178CB49A6h
                              jnc 00007FE178CB49A1h
                              outsb
                              outsb
                              jnc 00007FE178CB4965h
                              add byte ptr [00000601h], cl

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x152140x28.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x83ce.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                              IMAGE_DIRECTORY_ENTRY_IAT0x10000xe0.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x146440x15000False0.392857142857data5.46295201906IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .data0x160000xa180x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0x170000x83ce0x9000False0.339952256944data3.52770935798IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x1f2a60x128GLS_BINARY_LSB_FIRST
                              RT_ICON0x1dc7e0x1628dBase IV DBT of \200.DBF, blocks size 0, block length 4608, next free block index 40, next free block 0, next used block 0
                              RT_ICON0x1bfd60x1ca8data
                              RT_ICON0x1b32e0xca8data
                              RT_ICON0x1afc60x368GLS_BINARY_LSB_FIRST
                              RT_ICON0x18a1e0x25a8data
                              RT_ICON0x179760x10a8data
                              RT_ICON0x1750e0x468GLS_BINARY_LSB_FIRST
                              RT_GROUP_ICON0x174980x76data
                              RT_VERSION0x172400x258data

                              Imports

                              DLLImport
                              MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              InternalNameudfrlig
                              FileVersion1.00
                              CompanyNameSinth Radio
                              ProductNameSinth Radio
                              ProductVersion1.00
                              FileDescriptionSinth Radio
                              OriginalFilenameudfrlig.exe

                              Network Behavior

                              Network Port Distribution

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Feb 24, 2021 18:36:32.208460093 CET4955753192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:32.257194042 CET53495578.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:33.422243118 CET6173353192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:33.472306967 CET53617338.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:34.592509985 CET6544753192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:34.641379118 CET53654478.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:43.666870117 CET5244153192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:43.720164061 CET53524418.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:47.061758041 CET6217653192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:47.112010956 CET53621768.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:48.366338015 CET5959653192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:48.416636944 CET53595968.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:48.720249891 CET6529653192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:48.783117056 CET53652968.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:49.668557882 CET6318353192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:49.720951080 CET53631838.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:50.927479982 CET6015153192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:50.976226091 CET53601518.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:51.810408115 CET5696953192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:51.867913961 CET53569698.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:52.765450001 CET5516153192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:52.814199924 CET53551618.8.8.8192.168.2.5
                              Feb 24, 2021 18:36:53.611812115 CET5475753192.168.2.58.8.8.8
                              Feb 24, 2021 18:36:53.670384884 CET53547578.8.8.8192.168.2.5
                              Feb 24, 2021 18:37:07.737047911 CET4999253192.168.2.58.8.8.8
                              Feb 24, 2021 18:37:07.785698891 CET53499928.8.8.8192.168.2.5
                              Feb 24, 2021 18:37:30.320733070 CET6007553192.168.2.58.8.8.8
                              Feb 24, 2021 18:37:30.379899979 CET53600758.8.8.8192.168.2.5
                              Feb 24, 2021 18:37:37.036969900 CET5501653192.168.2.58.8.8.8
                              Feb 24, 2021 18:37:37.095369101 CET53550168.8.8.8192.168.2.5
                              Feb 24, 2021 18:38:08.992552996 CET6434553192.168.2.58.8.8.8
                              Feb 24, 2021 18:38:09.044436932 CET53643458.8.8.8192.168.2.5
                              Feb 24, 2021 18:38:11.223117113 CET5712853192.168.2.58.8.8.8
                              Feb 24, 2021 18:38:11.272001982 CET53571288.8.8.8192.168.2.5
                              Feb 24, 2021 18:38:11.842854023 CET5479153192.168.2.58.8.8.8
                              Feb 24, 2021 18:38:11.947535992 CET53547918.8.8.8192.168.2.5
                              Feb 24, 2021 18:38:26.526025057 CET5046353192.168.2.58.8.8.8
                              Feb 24, 2021 18:38:26.588095903 CET53504638.8.8.8192.168.2.5

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Feb 24, 2021 18:38:11.223117113 CET192.168.2.58.8.8.80xca67Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                              Feb 24, 2021 18:38:11.842854023 CET192.168.2.58.8.8.80x1e7cStandard query (0)cbzrfq.bl.files.1drv.comA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Feb 24, 2021 18:38:11.272001982 CET8.8.8.8192.168.2.50xca67No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                              Feb 24, 2021 18:38:11.947535992 CET8.8.8.8192.168.2.50x1e7cNo error (0)cbzrfq.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                              Feb 24, 2021 18:38:11.947535992 CET8.8.8.8192.168.2.50x1e7cNo error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:18:36:39
                              Start date:24/02/2021
                              Path:C:\Users\user\Desktop\LIZvq3EW7m.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\LIZvq3EW7m.exe'
                              Imagebase:0x400000
                              File size:131072 bytes
                              MD5 hash:5D2D34449323C67BA1F5EC7561DF2204
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Visual Basic
                              Reputation:low

                              General

                              Start time:18:38:00
                              Start date:24/02/2021
                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\LIZvq3EW7m.exe'
                              Imagebase:0x770000
                              File size:53248 bytes
                              MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.515531566.000000001D861000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 0000000E.00000002.510534238.0000000000B42000.00000040.00000001.sdmp, Author: Joe Security
                              Reputation:high

                              General

                              Start time:18:38:00
                              Start date:24/02/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff7ecfc0000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >