Loading ...

Play interactive tourEdit tour

Analysis Report caraganas.exe

Overview

General Information

Sample Name:caraganas.exe
Analysis ID:358114
MD5:99d875ac3341453383c9105669e14538
SHA1:c459b8df634dc70ea2537d9588eeeb3d2b644d94
SHA256:98bbdc74c1ff5407450d9019407d2012a08075269228497f10b9bf6e6471de42
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • caraganas.exe (PID: 6820 cmdline: 'C:\Users\user\Desktop\caraganas.exe' MD5: 99D875AC3341453383C9105669E14538)
    • RegAsm.exe (PID: 1724 cmdline: 'C:\Users\user\Desktop\caraganas.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 2916 cmdline: 'C:\Users\user\Desktop\caraganas.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 4588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "Q2TP9tlm", "URL: ": "http://8vV1Qxo32XjttpL.org", "To: ": "rzKGV@ahwhW.com", "ByHost: ": "mail.jesmar.net:587", "Password: ": "0s0uxNrAPxOSN", "From: ": "info@jesmar.net"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000006.00000002.596328627.0000000000B01000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
        Process Memory Space: RegAsm.exe PID: 2916JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 2916JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: RegAsm.exe.2916.6.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "Q2TP9tlm", "URL: ": "http://8vV1Qxo32XjttpL.org", "To: ": "rzKGV@ahwhW.com", "ByHost: ": "mail.jesmar.net:587", "Password: ": "0s0uxNrAPxOSN", "From: ": "info@jesmar.net"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: caraganas.exeMetadefender: Detection: 18%Perma Link
            Source: caraganas.exeReversingLabs: Detection: 10%

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: caraganas.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Uses new MSVCR DllsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Uses secure TLS version for HTTPS connectionsShow sources
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.6:49731 version: TLS 1.2
            Binary contains paths to debug symbolsShow sources
            Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000006.00000002.603402260.0000000020130000.00000002.00000001.sdmp

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: http://8vV1Qxo32XjttpL.org
            Source: Joe Sandbox ViewIP Address: 142.250.186.33 142.250.186.33
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS traffic detected: queries for: doc-08-58-docs.googleusercontent.com
            Source: RegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.601708769.000000001D916000.00000004.00000001.sdmpString found in binary or memory: http://8vV1Qxo32XjttpL.org
            Source: RegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpString found in binary or memory: http://DPtQpK.com
            Source: RegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
            Source: RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
            Source: RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
            Source: RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
            Source: RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/06
            Source: RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
            Source: RegAsm.exeString found in binary or memory: https://drive.google.com/uc?export=download&id=1QhM38kCW0J9xSmyfm4mPT5q5H_nh_JiH
            Source: RegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.6:49731 version: TLS 1.2
            Source: caraganas.exe, 00000001.00000002.412969250.000000000073A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05543 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B0592A NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B059BB NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05ABA NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05A96 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05AFB NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05AC5 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05A0B NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05A7E NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05B96 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05B82 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05BCB NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05B12 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05B46 NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05C2A NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05C5C NtSetInformationThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1D5CB0BA NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1D5CB089 NtQuerySystemInformation,
            Source: C:\Users\user\Desktop\caraganas.exeCode function: 1_2_00401A36
            Source: C:\Users\user\Desktop\caraganas.exeCode function: 1_2_004019E9
            Source: C:\Users\user\Desktop\caraganas.exeCode function: 1_2_004017F6
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00FAE1A8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00FA75B0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00FAC9D3
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00FA1B00
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00FAAE80
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00FA1BD8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1F99ED18
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1F99A698
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1F996840
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
            Source: caraganas.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/1@2/1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1D5CAF3E AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1D5CAF07 AdjustTokenPrivileges,
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4588:120:WilError_01
            Source: C:\Users\user\Desktop\caraganas.exeFile created: C:\Users\user\AppData\Local\Temp\~DFF94D9771C1CF7909.TMPJump to behavior
            Source: caraganas.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\caraganas.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\caraganas.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: caraganas.exeMetadefender: Detection: 18%
            Source: caraganas.exeReversingLabs: Detection: 10%
            Source: unknownProcess created: C:\Users\user\Desktop\caraganas.exe 'C:\Users\user\Desktop\caraganas.exe'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\caraganas.exe'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\caraganas.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\caraganas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\caraganas.exe'
            Source: C:\Users\user\Desktop\caraganas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\caraganas.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000006.00000002.603402260.0000000020130000.00000002.00000001.sdmp

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000006.00000002.596328627.0000000000B01000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2916, type: MEMORY
            Source: C:\Users\user\Desktop\caraganas.exeCode function: 1_2_00407A44 push edx; ret
            Source: C:\Users\user\Desktop\caraganas.exeCode function: 1_2_0040AE39 push edi; retn 0004h
            Source: C:\Users\user\Desktop\caraganas.exeCode function: 1_2_0040BBD4 push edi; retn 0004h
            Source: C:\Users\user\Desktop\caraganas.exeCode function: 1_2_02324E49 push ebx; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1F997648 push ebx; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1F99C643 push esp; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1FFD41C9 push cs; retf
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1FFD4155 push cs; retf
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1FFD40E1 push cs; retf
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Users\user\Desktop\caraganas.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\caraganas.exeRDTSC instruction interceptor: First address: 0000000002320156 second address: 0000000002320156 instructions:
            Source: C:\Users\user\Desktop\caraganas.exeRDTSC instruction interceptor: First address: 00000000023227B7 second address: 00000000023227B7 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F0D5C842EE8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e test ch, ah 0x00000020 add edi, edx 0x00000022 dec ecx 0x00000023 cmp ecx, 00000000h 0x00000026 jne 00007F0D5C842ED1h 0x00000028 push ecx 0x00000029 call 00007F0D5C842F2Eh 0x0000002e call 00007F0D5C842EF8h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\caraganas.exeRDTSC instruction interceptor: First address: 000000000232310C second address: 000000000232310C instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000B02E85 second address: 0000000000B02E85 instructions:
            Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFunction Chain: threadDelayed,memAlloc,systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,memAlloc,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\caraganas.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\caraganas.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exe, 00000006.00000002.596328627.0000000000B01000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE9
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\caraganas.exeRDTSC instruction interceptor: First address: 0000000002320156 second address: 0000000002320156 instructions:
            Source: C:\Users\user\Desktop\caraganas.exeRDTSC instruction interceptor: First address: 00000000023227B7 second address: 00000000023227B7 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F0D5C842EE8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e test ch, ah 0x00000020 add edi, edx 0x00000022 dec ecx 0x00000023 cmp ecx, 00000000h 0x00000026 jne 00007F0D5C842ED1h 0x00000028 push ecx 0x00000029 call 00007F0D5C842F2Eh 0x0000002e call 00007F0D5C842EF8h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\caraganas.exeRDTSC instruction interceptor: First address: 0000000002322948 second address: 0000000002322948 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F0D5D0180FDh 0x0000001d popad 0x0000001e call 00007F0D5D015C76h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\caraganas.exeRDTSC instruction interceptor: First address: 000000000232310C second address: 000000000232310C instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000B02948 second address: 0000000000B02948 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F0D5D0180FDh 0x0000001d popad 0x0000001e call 00007F0D5D015C76h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000B02E85 second address: 0000000000B02E85 instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B027A6 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 465
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5684Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5684Thread sleep time: -13950000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5684Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RegAsm.exe, 00000006.00000002.596328627.0000000000B01000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe9
            Source: RegAsm.exe, 00000006.00000002.602849189.000000001FD40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: RegAsm.exe, 00000006.00000002.602849189.000000001FD40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: RegAsm.exe, 00000006.00000002.602849189.000000001FD40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: RegAsm.exe, 00000006.00000002.602849189.000000001FD40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\caraganas.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\caraganas.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B027A6 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_1F99DDB0 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B040D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B05122 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B0514A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B0514D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B0263B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B049BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 6_2_00B049C5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\caraganas.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: B00000
            Source: C:\Users\user\Desktop\caraganas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\caraganas.exe'
            Source: C:\Users\user\Desktop\caraganas.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\caraganas.exe'
            Source: RegAsm.exe, 00000006.00000002.597355520.00000000013A0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000006.00000002.597355520.00000000013A0000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000006.00000002.597355520.00000000013A0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
            Source: RegAsm.exe, 00000006.00000002.597355520.00000000013A0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2916, type: MEMORY
            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Yara matchFile source: 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2916, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2916, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Access Token Manipulation1Virtualization/Sandbox Evasion34OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools11Input Capture1Security Software Discovery631Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Access Token Manipulation1Credentials in Registry1Virtualization/Sandbox Evasion34SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSProcess Discovery2Distributed Component Object ModelData from Local System2Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery314Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 358114 Sample: caraganas.exe Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 19 mail.jesmar.net 2->19 21 jesmar.net 2->21 27 Found malware configuration 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected GuLoader 2->31 33 3 other signatures 2->33 8 caraganas.exe 1 2->8         started        signatures3 process4 signatures5 35 Writes to foreign memory regions 8->35 37 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 8->37 39 Tries to detect Any.run 8->39 41 2 other signatures 8->41 11 RegAsm.exe 11 8->11         started        15 RegAsm.exe 8->15         started        process6 dnsIp7 23 googlehosted.l.googleusercontent.com 142.250.186.33, 443, 49731 GOOGLEUS United States 11->23 25 doc-08-58-docs.googleusercontent.com 11->25 43 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->43 45 Tries to steal Mail credentials (via file access) 11->45 47 Tries to harvest and steal ftp login credentials 11->47 55 3 other signatures 11->55 17 conhost.exe 11->17         started        49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->49 51 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->51 53 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 15->53 57 2 other signatures 15->57 signatures8 process9

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            caraganas.exe19%MetadefenderBrowse
            caraganas.exe11%ReversingLabsWin32.Trojan.Generic

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://r3.o.lencr.org00%URL Reputationsafe
            http://r3.o.lencr.org00%URL Reputationsafe
            http://r3.o.lencr.org00%URL Reputationsafe
            http://8vV1Qxo32XjttpL.org0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://cps.letsencrypt.org00%URL Reputationsafe
            http://cps.letsencrypt.org00%URL Reputationsafe
            http://cps.letsencrypt.org00%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://DPtQpK.com0%Avira URL Cloudsafe
            http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
            http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
            http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
            http://r3.i.lencr.org/060%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            googlehosted.l.googleusercontent.com
            142.250.186.33
            truefalse
              high
              jesmar.net
              31.193.225.171
              truetrue
                unknown
                doc-08-58-docs.googleusercontent.com
                unknown
                unknownfalse
                  high
                  mail.jesmar.net
                  unknown
                  unknowntrue
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    http://8vV1Qxo32XjttpL.orgtrue
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://r3.o.lencr.org0RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSRegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://cps.letsencrypt.org0RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://DPtQpK.comRegAsm.exe, 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://cps.root-x1.letsencrypt.org0RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://r3.i.lencr.org/06RegAsm.exe, 00000006.00000002.601670799.000000001D905000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    142.250.186.33
                    unknownUnited States
                    15169GOOGLEUSfalse

                    General Information

                    Joe Sandbox Version:31.0.0 Emerald
                    Analysis ID:358114
                    Start date:25.02.2021
                    Start time:03:38:05
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 48s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:caraganas.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:24
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@6/1@2/1
                    EGA Information:Failed
                    HDC Information:
                    • Successful, ratio: 19.6% (good quality ratio 10.4%)
                    • Quality average: 34.6%
                    • Quality standard deviation: 38.5%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .exe
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • TCP Packets have been reduced to 100
                    • Excluded IPs from analysis (whitelisted): 13.64.90.137, 92.122.145.220, 40.88.32.150, 168.61.161.212, 52.147.198.201, 51.104.139.180, 142.250.74.206, 8.238.85.254, 67.27.159.254, 67.26.17.254, 8.252.5.126, 8.238.85.126, 51.103.5.159, 52.155.217.156, 92.122.213.247, 92.122.213.194, 20.54.26.129, 23.218.208.56
                    • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, audownload.windowsupdate.nsatc.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/358114/sample/caraganas.exe

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    03:39:40API Interceptor702x Sleep call for process: RegAsm.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    142.250.186.33#U266b VM_540283.htmGet hashmaliciousBrowse
                      _vm54959395930.htmGet hashmaliciousBrowse
                        Malone3388_001.htmGet hashmaliciousBrowse
                          dgaTCZovz.msiGet hashmaliciousBrowse
                            2021-Nieuwepayroll-Aanpassing.htmlGet hashmaliciousBrowse
                              PO112000891122110.exeGet hashmaliciousBrowse
                                GUEROLA INDUSTRIES N#U00ba de cuenta.exeGet hashmaliciousBrowse
                                  xerox for hycite.htmGet hashmaliciousBrowse
                                    Muligheds.exeGet hashmaliciousBrowse

                                      Domains

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      googlehosted.l.googleusercontent.com#U266b VM_540283.htmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      _vm54959395930.htmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Malone3388_001.htmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      dgaTCZovz.msiGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      2021-Nieuwepayroll-Aanpassing.htmlGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      seed.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      PO112000891122110.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      GUEROLA INDUSTRIES N#U00ba de cuenta.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      xerox for hycite.htmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Muligheds.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      2021-Nouvelle masse salariale-Rapport.htmlGet hashmaliciousBrowse
                                      • 216.58.209.33
                                      SOLICITUD DE HERJIMAR, SL (HJM-745022821).exeGet hashmaliciousBrowse
                                      • 216.58.208.161
                                      #U6211#U662f#U56fe#U7247.exeGet hashmaliciousBrowse
                                      • 216.58.208.161
                                      OneNote rmos@dataflex-int.com.htmlGet hashmaliciousBrowse
                                      • 216.58.208.129
                                      Sponsor A Child, Best Online Donation Site, Top NGO - World Vision India.htmlGet hashmaliciousBrowse
                                      • 172.217.20.225
                                      barcelona-v-psg-liv-uefa-2021.htmlGet hashmaliciousBrowse
                                      • 172.217.20.225
                                      Barcelona-v-PSG-0tv.htmlGet hashmaliciousBrowse
                                      • 172.217.20.225
                                      CONSTRUCCIONES SAN MART#U00cdN, S.A. SOLICITAR. (SMT-14517022021).exeGet hashmaliciousBrowse
                                      • 172.217.20.225
                                      executable.908.exeGet hashmaliciousBrowse
                                      • 216.58.208.161
                                      executable.908.exeGet hashmaliciousBrowse
                                      • 216.58.208.161

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      GOOGLEUS2021_02_25.exeGet hashmaliciousBrowse
                                      • 34.102.136.180
                                      #U266b VM_540283.htmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      _vm54959395930.htmGet hashmaliciousBrowse
                                      • 172.217.16.150
                                      007.docxGet hashmaliciousBrowse
                                      • 216.239.34.21
                                      007.docxGet hashmaliciousBrowse
                                      • 216.239.34.21
                                      docabrir#U2332nsakjfsdi.msiGet hashmaliciousBrowse
                                      • 35.192.222.107
                                      Malone3388_001.htmGet hashmaliciousBrowse
                                      • 142.250.186.35
                                      55gfganfgF.exeGet hashmaliciousBrowse
                                      • 34.102.136.180
                                      YcvIOMqVPE.exeGet hashmaliciousBrowse
                                      • 35.228.210.99
                                      YcvIOMqVPE.exeGet hashmaliciousBrowse
                                      • 35.228.210.99
                                      yrsTO0ER4V.exeGet hashmaliciousBrowse
                                      • 34.102.136.180
                                      Wd8LBdddKD.exeGet hashmaliciousBrowse
                                      • 8.8.8.8
                                      GRAFINGER#00124022021#INVOICE#.exeGet hashmaliciousBrowse
                                      • 34.98.99.30
                                      mt5setup.exeGet hashmaliciousBrowse
                                      • 8.8.8.8
                                      vEpq5DFvETGet hashmaliciousBrowse
                                      • 216.239.35.0
                                      RQP_10378065.exeGet hashmaliciousBrowse
                                      • 34.102.136.180
                                      vEpq5DFvETGet hashmaliciousBrowse
                                      • 142.250.184.74
                                      Price quotation.exeGet hashmaliciousBrowse
                                      • 34.102.136.180
                                      DHL Shipping Document_Pdf.exeGet hashmaliciousBrowse
                                      • 34.102.136.180
                                      886t3PbVKb.apkGet hashmaliciousBrowse
                                      • 142.250.180.142

                                      JA3 Fingerprints

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      37f463bf4616ecd445d4a1937da06e19Notification 466022.xlsmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Fax #136.xlsmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Purchase Order22420.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      ceFlxYfe4F.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Fatura.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Reports #176.xlsmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      SecuriteInfo.com.VB.Heur2.EmoDldr.5.B611173F.Gen.18420.xlsmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Scan #84462.xlsmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Invoice_#_6774.xlsmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Concentracion de pedidos_PO.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Notice 698.xlsmGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Waybill.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      qBS4ZpUp8z.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      O5xV2xnPRG.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      New purchase order PO 78903215,pdf.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Customer-2-24-2021.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      xRxGPqypIw.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Customer-2-24-2021.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      Customer-2-24-2021.exeGet hashmaliciousBrowse
                                      • 142.250.186.33
                                      logs.php.dllGet hashmaliciousBrowse
                                      • 142.250.186.33

                                      Dropped Files

                                      No context

                                      Created / dropped Files

                                      \Device\ConDrv
                                      Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):30
                                      Entropy (8bit):3.964735178725505
                                      Encrypted:false
                                      SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                      MD5:9F754B47B351EF0FC32527B541420595
                                      SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                      SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                      SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview: NordVPN directory not found!..

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):5.37222266574873
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.15%
                                      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:caraganas.exe
                                      File size:73728
                                      MD5:99d875ac3341453383c9105669e14538
                                      SHA1:c459b8df634dc70ea2537d9588eeeb3d2b644d94
                                      SHA256:98bbdc74c1ff5407450d9019407d2012a08075269228497f10b9bf6e6471de42
                                      SHA512:d31f378dfc326ce5b84a73e7831d465860a20bd1ea2c61df1276821ac28275ca66b604e75a1e0634aaee52e652ee9e0a514175109fe91721a0e33ea4f8176b69
                                      SSDEEP:1536:lX/wjwu21SsQTT+d6oaVoEsVjcOekVBxEsfX:lvwN2aZaEejbeYBJf
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.......................D.......=.......Rich............PE..L......N.....................0....................@................

                                      File Icon

                                      Icon Hash:b038b57269717938

                                      Static PE Info

                                      General

                                      Entrypoint:0x401394
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                      DLL Characteristics:
                                      Time Stamp:0x4E1EA599 [Thu Jul 14 08:15:21 2011 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f783b7553c2ee07b6bd756ebd3705f2c

                                      Entrypoint Preview

                                      Instruction
                                      push 0040A3F8h
                                      call 00007F0D5CE25475h
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      xor byte ptr [eax], al
                                      add byte ptr [eax], al
                                      inc eax
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add bh, dl
                                      daa
                                      pop edx
                                      in al, dx
                                      jecxz 00007F0D5CE254C8h
                                      sbb eax, 9927B44Dh
                                      fdivr dword ptr [ebx+65h]
                                      cmp al, byte ptr [eax]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [ecx], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax+eax], al
                                      add byte ptr [eax], al
                                      inc ecx
                                      insb
                                      imul esp, dword ptr [ebp+6Eh], 6C696261h
                                      imul esi, dword ptr [ecx+edi*2+37h], 00000000h
                                      add byte ptr [eax], al
                                      add bh, bh
                                      int3
                                      xor dword ptr [eax], eax
                                      or ah, byte ptr [eax+7A66635Bh]
                                      out 40h, eax
                                      mov dh, byte ptr [eax+2CBE1EF8h]
                                      mov bl, 85h
                                      adc eax, 85736377h
                                      pop eax
                                      movsd
                                      dec esp
                                      test al, 77h
                                      mov byte ptr [708DFD57h], al
                                      sar dword ptr [edx], 1
                                      dec edi
                                      lodsd
                                      xor ebx, dword ptr [ecx-48EE309Ah]
                                      or al, 00h
                                      stosb
                                      add byte ptr [eax-2Dh], ah
                                      xchg eax, ebx
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      ret
                                      mov es, word ptr [eax]
                                      add byte ptr [edi], cl
                                      or al, 00h
                                      add byte ptr [eax], al
                                      or byte ptr [eax], al
                                      push ebx
                                      inc ebp
                                      dec esi
                                      dec edi
                                      push eax
                                      dec ecx
                                      inc ecx
                                      push ebx
                                      add byte ptr [41000B01h], cl
                                      jne 00007F0D5CE254E9h
                                      insd
                                      outsb

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xeb140x28.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000xf46.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x11c.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000xe0080xf000False0.374365234375data5.84340475818IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .data0x100000x12100x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                      .rsrc0x120000xf460x1000False0.323974609375data3.6279359857IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0x12c5e0x2e8data
                                      RT_ICON0x123b60x8a8data
                                      RT_GROUP_ICON0x123940x22data
                                      RT_VERSION0x121200x274dataEnglishUnited States

                                      Imports

                                      DLLImport
                                      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaHresultCheck, __vbaFreeVar, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaLenBstrB, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaNew2, __vbaR8Str, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaStrToAnsi, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

                                      Version Infos

                                      DescriptionData
                                      Translation0x0409 0x04b0
                                      InternalNamecaraganas
                                      FileVersion1.00
                                      CompanyNameWang
                                      ProductNameWang Laboratories
                                      ProductVersion1.00
                                      FileDescriptionWang Laboratories
                                      OriginalFilenamecaraganas.exe

                                      Possible Origin

                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States

                                      Network Behavior

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 25, 2021 03:39:32.892580986 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:32.941040993 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:32.941245079 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:32.942042112 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:32.992175102 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:32.999365091 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:32.999404907 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:32.999422073 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:32.999440908 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:32.999546051 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:32.999603987 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.016689062 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.065464020 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.065581083 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.066787958 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.120054007 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.464006901 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.464046001 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.464067936 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.464095116 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.464121103 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.464171886 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.464234114 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.467473984 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.467505932 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.467647076 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.471004009 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.471034050 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.471131086 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.474544048 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.474572897 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.474647045 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.478106022 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.478138924 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.478250027 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.481662035 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.481693029 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.481801033 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.515280962 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.515316963 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.515465021 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.517007113 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.517051935 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.517106056 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.517152071 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.520566940 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.520597935 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.520689964 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.524132013 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.524164915 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.524403095 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.527677059 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.527714968 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.527812958 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.531229019 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.531264067 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.531332016 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.531347036 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.534768105 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.534823895 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.534858942 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.534869909 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.538305998 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.538378000 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.538394928 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.538431883 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.541841984 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.541923046 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.541991949 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.542016983 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.545074940 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.545114040 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.545182943 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.545203924 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.548257113 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.548284054 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.548398018 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.551470041 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.551508904 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.551604986 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.554658890 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.554694891 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.554801941 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.557887077 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.557914019 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.558136940 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.561103106 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.561136007 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.561333895 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.564265966 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.564310074 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.565624952 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.566663027 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.566694021 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.566797972 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.569072962 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.569107056 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.569205999 CET49731443192.168.2.6142.250.186.33
                                      Feb 25, 2021 03:39:33.571403027 CET44349731142.250.186.33192.168.2.6
                                      Feb 25, 2021 03:39:33.571460009 CET44349731142.250.186.33192.168.2.6

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 25, 2021 03:38:49.520376921 CET5451353192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:49.569129944 CET53545138.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:50.725361109 CET6204453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:50.776966095 CET53620448.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:51.602782965 CET6379153192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:51.666085958 CET53637918.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:51.841176033 CET6426753192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:51.889820099 CET53642678.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:52.662291050 CET4944853192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:52.724816084 CET53494488.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:54.352112055 CET6034253192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:54.400726080 CET53603428.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:55.452254057 CET6134653192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:55.501506090 CET53613468.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:56.841079950 CET5177453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:56.892456055 CET53517748.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:57.885452032 CET5602353192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:57.935703039 CET53560238.8.8.8192.168.2.6
                                      Feb 25, 2021 03:38:58.996341944 CET5838453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:38:59.044984102 CET53583848.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:02.026618958 CET6026153192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:02.083858013 CET53602618.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:03.546421051 CET5606153192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:03.598012924 CET53560618.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:05.042284966 CET5833653192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:05.090909958 CET53583368.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:06.183034897 CET5378153192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:06.231765985 CET53537818.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:09.605909109 CET5406453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:09.663002968 CET53540648.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:10.888000965 CET5281153192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:10.936796904 CET53528118.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:16.163872004 CET5529953192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:16.215333939 CET53552998.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:17.358856916 CET6374553192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:17.407619953 CET53637458.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:18.316808939 CET5005553192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:18.365422010 CET53500558.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:27.044488907 CET6137453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:27.101442099 CET53613748.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:31.931888103 CET5033953192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:31.996824026 CET53503398.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:32.822289944 CET6330753192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:32.889815092 CET53633078.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:41.844738007 CET4969453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:41.893518925 CET53496948.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:42.355221033 CET5498253192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:42.407068014 CET53549828.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:53.450579882 CET5001053192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:53.525068998 CET53500108.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:54.167206049 CET6371853192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:54.232435942 CET53637188.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:54.902559042 CET6211653192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:54.959688902 CET53621168.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:55.261955976 CET6381653192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:55.320657969 CET53638168.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:55.446880102 CET5501453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:55.507298946 CET53550148.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:56.017330885 CET6220853192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:56.074331999 CET53622088.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:56.451128006 CET5757453192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:56.521250963 CET53575748.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:56.718493938 CET5181853192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:56.775620937 CET53518188.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:57.439476013 CET5662853192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:57.503077030 CET53566288.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:58.599405050 CET6077853192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:58.662471056 CET53607788.8.8.8192.168.2.6
                                      Feb 25, 2021 03:39:59.720320940 CET5379953192.168.2.68.8.8.8
                                      Feb 25, 2021 03:39:59.779710054 CET53537998.8.8.8192.168.2.6
                                      Feb 25, 2021 03:40:00.333647966 CET5468353192.168.2.68.8.8.8
                                      Feb 25, 2021 03:40:00.393521070 CET53546838.8.8.8192.168.2.6
                                      Feb 25, 2021 03:40:26.525959969 CET5932953192.168.2.68.8.8.8
                                      Feb 25, 2021 03:40:26.611301899 CET53593298.8.8.8192.168.2.6
                                      Feb 25, 2021 03:40:32.628760099 CET6402153192.168.2.68.8.8.8
                                      Feb 25, 2021 03:40:32.677517891 CET53640218.8.8.8192.168.2.6
                                      Feb 25, 2021 03:40:33.569704056 CET5612953192.168.2.68.8.8.8
                                      Feb 25, 2021 03:40:33.643892050 CET53561298.8.8.8192.168.2.6
                                      Feb 25, 2021 03:41:02.268177032 CET5817753192.168.2.68.8.8.8
                                      Feb 25, 2021 03:41:02.357585907 CET53581778.8.8.8192.168.2.6

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Feb 25, 2021 03:39:32.822289944 CET192.168.2.68.8.8.80x4252Standard query (0)doc-08-58-docs.googleusercontent.comA (IP address)IN (0x0001)
                                      Feb 25, 2021 03:41:02.268177032 CET192.168.2.68.8.8.80xaa84Standard query (0)mail.jesmar.netA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Feb 25, 2021 03:39:32.889815092 CET8.8.8.8192.168.2.60x4252No error (0)doc-08-58-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                                      Feb 25, 2021 03:39:32.889815092 CET8.8.8.8192.168.2.60x4252No error (0)googlehosted.l.googleusercontent.com142.250.186.33A (IP address)IN (0x0001)
                                      Feb 25, 2021 03:41:02.357585907 CET8.8.8.8192.168.2.60xaa84No error (0)mail.jesmar.netjesmar.netCNAME (Canonical name)IN (0x0001)
                                      Feb 25, 2021 03:41:02.357585907 CET8.8.8.8192.168.2.60xaa84No error (0)jesmar.net31.193.225.171A (IP address)IN (0x0001)

                                      HTTPS Packets

                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                      Feb 25, 2021 03:39:32.999440908 CET142.250.186.33443192.168.2.649731CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Jan 26 10:05:02 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Apr 20 11:05:01 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                      CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:03:38:57
                                      Start date:25/02/2021
                                      Path:C:\Users\user\Desktop\caraganas.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\caraganas.exe'
                                      Imagebase:0x400000
                                      File size:73728 bytes
                                      MD5 hash:99D875AC3341453383C9105669E14538
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:Visual Basic
                                      Reputation:low

                                      General

                                      Start time:03:39:21
                                      Start date:25/02/2021
                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                      Wow64 process (32bit):false
                                      Commandline:'C:\Users\user\Desktop\caraganas.exe'
                                      Imagebase:0xc0000
                                      File size:53248 bytes
                                      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:03:39:22
                                      Start date:25/02/2021
                                      Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\caraganas.exe'
                                      Imagebase:0x680000
                                      File size:53248 bytes
                                      MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.601350930.000000001D7E1000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000006.00000002.596328627.0000000000B01000.00000040.00000001.sdmp, Author: Joe Security
                                      Reputation:high

                                      General

                                      Start time:03:39:22
                                      Start date:25/02/2021
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff61de10000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Disassembly

                                      Code Analysis

                                      Reset < >