Loading ...

Play interactive tourEdit tour

Analysis Report malware.exe

Overview

General Information

Sample Name:malware.exe
Analysis ID:358219
MD5:2ee5a68ee37af14c612fc4c8a589858a
SHA1:c27220c28c611908f7cf4e727619aef99decb00b
SHA256:7e2a3464cd57a807ba4fa1bc0cc9b61fd7ace25fae45a7227bc2184587c9945b
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
Binary contains a suspicious time stamp
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • malware.exe (PID: 6380 cmdline: 'C:\Users\user\Desktop\malware.exe' MD5: 2EE5A68EE37AF14C612FC4C8A589858A)
    • malware.exe (PID: 6536 cmdline: C:\Users\user\Desktop\malware.exe MD5: 2EE5A68EE37AF14C612FC4C8A589858A)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "FTP Info": "info@nijos.esJose170458@smtp.ionos.es"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.459799944.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.201927296.00000000040B5000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 5 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.malware.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.malware.exe.4374cd0.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.malware.exe.4374cd0.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.malware.exe.421ba00.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.2.malware.exe.4277620.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Antivirus / Scanner detection for submitted sampleShow sources
                      Source: malware.exeAvira: detected
                      Found malware configurationShow sources
                      Source: 0.2.malware.exe.4374cd0.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "FTP Info": "info@nijos.esJose170458@smtp.ionos.es"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: malware.exeVirustotal: Detection: 45%Perma Link
                      Source: malware.exeMetadefender: Detection: 24%Perma Link
                      Source: malware.exeReversingLabs: Detection: 68%
                      Machine Learning detection for sampleShow sources
                      Source: malware.exeJoe Sandbox ML: detected
                      Source: 0.2.malware.exe.930000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen3
                      Source: 3.2.malware.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

                      Compliance:

                      barindex
                      Uses 32bit PE filesShow sources
                      Source: malware.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Uses new MSVCR DllsShow sources
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                      Source: malware.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Binary contains paths to debug symbolsShow sources
                      Source: Binary string: mscorrc.pdb source: malware.exe, 00000000.00000002.203861566.00000000058D0000.00000002.00000001.sdmp, malware.exe, 00000003.00000002.461809030.00000000017D0000.00000002.00000001.sdmp
                      Source: C:\Users\user\Desktop\malware.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                      Source: C:\Users\user\Desktop\malware.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                      Source: global trafficTCP traffic: 192.168.2.3:49737 -> 213.165.67.118:587
                      Source: Joe Sandbox ViewIP Address: 213.165.67.118 213.165.67.118
                      Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
                      Source: global trafficTCP traffic: 192.168.2.3:49737 -> 213.165.67.118:587
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0174A09A recv,
                      Source: unknownDNS traffic detected: queries for: smtp.ionos.es
                      Source: malware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: malware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: malware.exe, 00000003.00000002.464733320.00000000035AF000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.geotrust.com/GeoTrustRSACA2018.crt0
                      Source: malware.exe, 00000003.00000002.464733320.00000000035AF000.00000004.00000001.sdmpString found in binary or memory: http://cdp.geotrust.com/GeoTrustRSACA2018.crl0L
                      Source: malware.exe, 00000003.00000002.464733320.00000000035AF000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                      Source: malware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpString found in binary or memory: http://eYrjmd.com
                      Source: malware.exe, 00000003.00000002.464733320.00000000035AF000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0B
                      Source: malware.exe, 00000003.00000002.464733320.00000000035AF000.00000004.00000001.sdmpString found in binary or memory: http://status.geotrust.com0=
                      Source: malware.exe, 00000003.00000002.465505838.0000000003A2D000.00000004.00000001.sdmpString found in binary or memory: https://QDDeRKxxql47yvGyut1.co
                      Source: malware.exe, 00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmpString found in binary or memory: https://QDDeRKxxql47yvGyut1.com
                      Source: malware.exe, 00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmpString found in binary or memory: https://QDDeRKxxql47yvGyut1.com4
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: malware.exe, 00000003.00000002.464733320.00000000035AF000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                      Source: malware.exe, 00000000.00000002.201927296.00000000040B5000.00000004.00000001.sdmp, malware.exe, 00000003.00000002.459799944.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: malware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: malware.exe, 00000000.00000002.200312637.000000000101A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 3.2.malware.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b3E7DD5E5u002d64B9u002d4B13u002dBB39u002d9D06C86D75B5u007d/C3653794u002dA817u002d4DEAu002d8ADFu002d8F127CE93D1E.csLarge array initialization: .cctor: array initializer size 11921
                      PE file contains section with special charsShow sources
                      Source: malware.exeStatic PE information: section name: 7wjw!
                      PE file has nameless sectionsShow sources
                      Source: malware.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0174B0BA NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0174B089 NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_0093E489
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_0093C8B2
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009405C2
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00939F78
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C8AEF0
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C80B50
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C800A8
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C829D8
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C83D30
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C8AEE0
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C853E0
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C853F0
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C80B3F
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C80099
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C829C8
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C851A8
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C851A3
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C83D20
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009338AA
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_0093A98D
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F005C2
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_057397DC
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0573AF98
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0573DE28
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05738488
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05EC98E0
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05EC73C8
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05EC26A8
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05EC0070
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05EC8658
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05EC6818
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_05EC25F8
                      Source: malware.exeBinary or memory string: OriginalFilename vs malware.exe
                      Source: malware.exe, 00000000.00000002.205160417.000000000DE40000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs malware.exe
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamexUHzFnbHwIrwSOMYICulYEVtzBE.exe4 vs malware.exe
                      Source: malware.exe, 00000000.00000002.203861566.00000000058D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs malware.exe
                      Source: malware.exe, 00000000.00000002.204525683.0000000009B10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs malware.exe
                      Source: malware.exe, 00000000.00000002.200312637.000000000101A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs malware.exe
                      Source: malware.exeBinary or memory string: OriginalFilename vs malware.exe
                      Source: malware.exe, 00000003.00000002.461809030.00000000017D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs malware.exe
                      Source: malware.exe, 00000003.00000002.459799944.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamexUHzFnbHwIrwSOMYICulYEVtzBE.exe4 vs malware.exe
                      Source: malware.exe, 00000003.00000002.466127885.0000000005A10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs malware.exe
                      Source: malware.exe, 00000003.00000002.461900198.0000000001880000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs malware.exe
                      Source: malware.exeBinary or memory string: OriginalFilenameNonVersionableAttribute.exeF vs malware.exe
                      Source: C:\Users\user\Desktop\malware.exeSection loaded: security.dll
                      Source: malware.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: malware.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: malware.exeStatic PE information: Section: 7wjw! ZLIB complexity 1.00046164773
                      Source: 3.2.malware.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 3.2.malware.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/2
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0174AF3E AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0174AF07 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\malware.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\malware.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\malware.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Users\user\Desktop\malware.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\malware.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\Desktop\malware.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\Desktop\malware.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\malware.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\Desktop\malware.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\Desktop\malware.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\malware.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\malware.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\malware.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\malware.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: malware.exeVirustotal: Detection: 45%
                      Source: malware.exeMetadefender: Detection: 24%
                      Source: malware.exeReversingLabs: Detection: 68%
                      Source: unknownProcess created: C:\Users\user\Desktop\malware.exe 'C:\Users\user\Desktop\malware.exe'
                      Source: unknownProcess created: C:\Users\user\Desktop\malware.exe C:\Users\user\Desktop\malware.exe
                      Source: C:\Users\user\Desktop\malware.exeProcess created: C:\Users\user\Desktop\malware.exe C:\Users\user\Desktop\malware.exe
                      Source: C:\Users\user\Desktop\malware.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                      Source: C:\Users\user\Desktop\malware.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: malware.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: malware.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: mscorrc.pdb source: malware.exe, 00000000.00000002.203861566.00000000058D0000.00000002.00000001.sdmp, malware.exe, 00000003.00000002.461809030.00000000017D0000.00000002.00000001.sdmp

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\malware.exeUnpacked PE file: 0.2.malware.exe.930000.0.unpack 7wjw!:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                      Binary contains a suspicious time stampShow sources
                      Source: initial sampleStatic PE information: 0xDA072381 [Thu Nov 29 19:35:29 2085 UTC]
                      Source: malware.exeStatic PE information: section name: 7wjw!
                      Source: malware.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00944292 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_0094429E push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009442BC push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009442AA push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009442F2 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00944B9E push ds; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00943D9A push es; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00944BBC push ds; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009441A2 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009441A2 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00944BAA push ds; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_009447C0 push ss; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00944B02 push ds; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_0094472A push ss; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_0094477E push ss; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_00944760 push ss; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 0_2_02C890C8 pushad ; retf
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F042F2 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F042BC push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F042AA push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F04292 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F0429E push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F047C0 push ss; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F04BBC push ds; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F041A2 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F041A2 push cs; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F04BAA push ds; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F03D9A push es; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F04B9E push ds; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F0477E push ss; ret
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_00F04760 push ss; ret
                      Source: initial sampleStatic PE information: section name: 7wjw! entropy: 7.99674140744
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85224276661
                      Source: C:\Users\user\Desktop\malware.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\malware.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM_3Show sources
                      Source: Yara matchFile source: 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: malware.exe PID: 6380, type: MEMORY
                      Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                      Source: C:\Users\user\Desktop\malware.exeFunction Chain: systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,processQueried,processQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\malware.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\malware.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Source: C:\Users\user\Desktop\malware.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\malware.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\malware.exeWindow / User API: threadDelayed 672
                      Source: C:\Users\user\Desktop\malware.exe TID: 6384Thread sleep time: -103256s >= -30000s
                      Source: C:\Users\user\Desktop\malware.exe TID: 6412Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\malware.exe TID: 6764Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\malware.exe TID: 6764Thread sleep count: 672 > 30
                      Source: C:\Users\user\Desktop\malware.exe TID: 6764Thread sleep time: -20160000s >= -30000s
                      Source: C:\Users\user\Desktop\malware.exe TID: 6764Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\Desktop\malware.exe TID: 6764Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\Desktop\malware.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\malware.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\malware.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\malware.exeLast function: Thread delayed
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: malware.exe, 00000003.00000002.466127885.0000000005A10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: malware.exe, 00000000.00000002.205104429.000000000DDE0000.00000004.00000001.sdmpBinary or memory string: AQEMuK
                      Source: malware.exe, 00000003.00000002.466127885.0000000005A10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: malware.exe, 00000003.00000002.466127885.0000000005A10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: malware.exe, 00000003.00000002.461473019.00000000015C9000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: malware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: malware.exe, 00000003.00000002.466127885.0000000005A10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\malware.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\malware.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\malware.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_057330C8 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\malware.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\malware.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\malware.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\malware.exeMemory written: C:\Users\user\Desktop\malware.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\malware.exeProcess created: C:\Users\user\Desktop\malware.exe C:\Users\user\Desktop\malware.exe
                      Source: malware.exe, 00000003.00000002.461920865.0000000001C20000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: malware.exe, 00000003.00000002.461920865.0000000001C20000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: malware.exe, 00000003.00000002.461920865.0000000001C20000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: malware.exe, 00000003.00000002.461920865.0000000001C20000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\malware.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\malware.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\malware.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\malware.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\malware.exeCode function: 3_2_0174BB16 GetUserNameW,
                      Source: C:\Users\user\Desktop\malware.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.459799944.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.201927296.00000000040B5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: malware.exe PID: 6380, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: malware.exe PID: 6536, type: MEMORY
                      Source: Yara matchFile source: 3.2.malware.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.4374cd0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.4374cd0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.421ba00.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.4277620.4.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\malware.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\malware.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\malware.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\malware.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: malware.exe PID: 6536, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.459799944.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.201927296.00000000040B5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: malware.exe PID: 6380, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: malware.exe PID: 6536, type: MEMORY
                      Source: Yara matchFile source: 3.2.malware.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.4374cd0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.4374cd0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.421ba00.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.malware.exe.4277620.4.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools11OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information1Input Capture1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Process Injection112Obfuscated Files or Information3Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing14NTDSSecurity Software Discovery221Distributed Component Object ModelInput Capture1Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsVirtualization/Sandbox Evasion14SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion14Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection112Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      malware.exe45%VirustotalBrowse
                      malware.exe30%MetadefenderBrowse
                      malware.exe69%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      malware.exe100%AviraHEUR/AGEN.1138558
                      malware.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.2.malware.exe.930000.0.unpack100%AviraTR/Crypt.XPACK.Gen3Download File
                      3.2.malware.exe.ef0000.1.unpack100%AviraHEUR/AGEN.1138558Download File
                      3.2.malware.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      0.0.malware.exe.930000.0.unpack100%AviraHEUR/AGEN.1138558Download File
                      3.0.malware.exe.ef0000.0.unpack100%AviraHEUR/AGEN.1138558Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      smtp.ionos.es2%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://QDDeRKxxql47yvGyut1.com40%Avira URL Cloudsafe
                      https://QDDeRKxxql47yvGyut1.com0%Avira URL Cloudsafe
                      http://eYrjmd.com0%Avira URL Cloudsafe
                      https://QDDeRKxxql47yvGyut1.co0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      smtp.ionos.es
                      213.165.67.118
                      truetrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1malware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSmalware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://QDDeRKxxql47yvGyut1.com4malware.exe, 00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://QDDeRKxxql47yvGyut1.commalware.exe, 00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://eYrjmd.commalware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://QDDeRKxxql47yvGyut1.comalware.exe, 00000003.00000002.465505838.0000000003A2D000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hamalware.exe, 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipmalware.exe, 00000000.00000002.201927296.00000000040B5000.00000004.00000001.sdmp, malware.exe, 00000003.00000002.459799944.0000000000402000.00000040.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssmalware.exe, 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmpfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        213.165.67.118
                        unknownGermany
                        8560ONEANDONE-ASBrauerstrasse48DEtrue

                        Private

                        IP
                        192.168.2.1

                        General Information

                        Joe Sandbox Version:31.0.0 Emerald
                        Analysis ID:358219
                        Start date:25.02.2021
                        Start time:08:57:15
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 52s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:malware.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:28
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/1@1/2
                        EGA Information:Failed
                        HDC Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                        • Excluded IPs from analysis (whitelisted): 40.88.32.150, 92.122.145.220, 131.253.33.200, 13.107.22.200, 104.43.193.48, 13.64.90.137, 52.255.188.83, 51.11.168.160, 184.30.20.56, 92.122.213.247, 92.122.213.194, 20.54.26.129, 51.104.139.180
                        • Excluded domains from analysis (whitelisted): www.bing.com, skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        08:58:01API Interceptor980x Sleep call for process: malware.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        213.165.67.118JUSTF11.exeGet hashmaliciousBrowse
                          FAC20.exeGet hashmaliciousBrowse
                            TRANFl.exeGet hashmaliciousBrowse
                              JUSTF2.tarGet hashmaliciousBrowse
                                Oroder no 3.exeGet hashmaliciousBrowse
                                  ORDER0984653.exeGet hashmaliciousBrowse
                                    34433453-WONDN5-FTBO-9766464.exeGet hashmaliciousBrowse
                                      Catalogs.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        smtp.ionos.esJUSTF11.exeGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        FAC20.exeGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        TRANFl.exeGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        JUSTF2.tarGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        JUST1F1CA.exeGet hashmaliciousBrowse
                                        • 213.165.67.102
                                        orders.exeGet hashmaliciousBrowse
                                        • 213.165.67.102
                                        Oroder no 3.exeGet hashmaliciousBrowse
                                        • 213.165.67.102
                                        ORDER0984653.exeGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        ORDER8162020.exeGet hashmaliciousBrowse
                                        • 213.165.67.102
                                        4642WOT-T7864-66OBO.exeGet hashmaliciousBrowse
                                        • 213.165.67.102
                                        34433453-WONDN5-FTBO-9766464.exeGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        Catalogs.exeGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        86597599579.exeGet hashmaliciousBrowse
                                        • 213.165.67.102
                                        troystealer.exeGet hashmaliciousBrowse
                                        • 213.165.67.102

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        ONEANDONE-ASBrauerstrasse48DEBetalingsadvies Opmerking.exeGet hashmaliciousBrowse
                                        • 212.227.15.142
                                        42#U0438.exeGet hashmaliciousBrowse
                                        • 212.227.15.142
                                        WYX-09901.exeGet hashmaliciousBrowse
                                        • 212.227.15.142
                                        530000.exeGet hashmaliciousBrowse
                                        • 82.165.103.72
                                        raLXirFBY1.exeGet hashmaliciousBrowse
                                        • 66.175.232.221
                                        Tyre Order 24th February.xlsxGet hashmaliciousBrowse
                                        • 217.160.0.201
                                        HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                        • 212.227.17.174
                                        HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                        • 212.227.17.184
                                        MV9tCJw8Xr.exeGet hashmaliciousBrowse
                                        • 74.208.173.91
                                        ohLCullPse.exeGet hashmaliciousBrowse
                                        • 66.175.232.221
                                        e-profile.exeGet hashmaliciousBrowse
                                        • 74.208.88.51
                                        SecuriteInfo.com.Trojan.Packed2.42850.9624.exeGet hashmaliciousBrowse
                                        • 198.251.65.112
                                        JUSTF11.exeGet hashmaliciousBrowse
                                        • 213.165.67.118
                                        Nota de aviso de pago.exeGet hashmaliciousBrowse
                                        • 212.227.15.142
                                        Drawings.xlsmGet hashmaliciousBrowse
                                        • 74.208.236.5
                                        SWIFT COMMERCIAL DUTY 0818J.exeGet hashmaliciousBrowse
                                        • 74.208.5.2
                                        Proforma invoice.xlsxGet hashmaliciousBrowse
                                        • 198.71.50.125
                                        Purchase Order.exeGet hashmaliciousBrowse
                                        • 198.71.50.125
                                        Proforma invoice.exeGet hashmaliciousBrowse
                                        • 198.71.50.125
                                        5i8sLcQqHI.dllGet hashmaliciousBrowse
                                        • 217.160.107.189

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\malware.exe.log
                                        Process:C:\Users\user\Desktop\malware.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):782
                                        Entropy (8bit):5.273573871875595
                                        Encrypted:false
                                        SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3AN0U22v:MLF20NaL3z2p29hJ5g522rW2xAi3AP2I
                                        MD5:F15C9C88F7D7A8FD8C28FD33A19EEDC1
                                        SHA1:F703E7360D4958CE7BC5362E8AAC8EA150DACE7C
                                        SHA-256:C32A5354F545CCE575E77A171272F0A9CBD6CD4501AAB657C893A663D3F0E00E
                                        SHA-512:B3DE9EE4E585FF1C48AE3DFC19A60039D461FCB551F2BF4E22C59A634270E95EFEC240FB1C420DB6F189354B1AAA90D4DC3F85FFD690D70CC4E5CD595FE10E94
                                        Malicious:true
                                        Reputation:moderate, very likely benign file
                                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data\27ab8d047396db374abb803b446b76f0\System.Data.ni.dll",0..

                                        Static File Info

                                        General

                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.856223289308941
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                        • Win32 Executable (generic) a (10002005/4) 49.96%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:malware.exe
                                        File size:543232
                                        MD5:2ee5a68ee37af14c612fc4c8a589858a
                                        SHA1:c27220c28c611908f7cf4e727619aef99decb00b
                                        SHA256:7e2a3464cd57a807ba4fa1bc0cc9b61fd7ace25fae45a7227bc2184587c9945b
                                        SHA512:e58676f9df7185bea043d07910fae75bf9ec82a80e2f6f09227c621ed46b3676bb5535c64368ec81ed229f9b7e37f448e8847a24d2b0be8ef88724849a968082
                                        SSDEEP:12288:RFq90ghy2fQTVHv0jAJEnz4VUIZLO98cx:RSy2foHv0jCEYbjcx
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#................P..`................... ....@.. ....................................@................................

                                        File Icon

                                        Icon Hash:00828e8e8686b000

                                        Static PE Info

                                        General

                                        Entrypoint:0x48a00a
                                        Entrypoint Section:
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0xDA072381 [Thu Nov 29 19:35:29 2085 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v2.0.50727
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                        Entrypoint Preview

                                        Instruction
                                        jmp dword ptr [0048A000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al

                                        Data Directories

                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x103c40x57.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x640.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x8a0000x8
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x100000x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                        Sections

                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        7wjw!0x20000xdb840xdc00False1.00046164773data7.99674140744IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                        .text0x100000x75d300x75e00False0.888632522534data7.85224276661IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0x860000x6400x800False0.33984375data3.51419264617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x880000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        0x8a0000x100x200False0.044921875data0.122275881259IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ

                                        Resources

                                        NameRVASizeTypeLanguageCountry
                                        RT_VERSION0x860a00x3b0data
                                        RT_MANIFEST0x864500x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                        Imports

                                        DLLImport
                                        mscoree.dll_CorExeMain

                                        Version Infos

                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyrightCopyright Hotplates 2020-2021
                                        Assembly Version2.0.9.0
                                        InternalNameNonVersionableAttribute.exe
                                        FileVersion2.0.9.0
                                        CompanyNameHotplates
                                        LegalTrademarks
                                        CommentsMLT
                                        ProductNameMedical Laboratory
                                        ProductVersion2.0.9.0
                                        FileDescriptionMedical Laboratory
                                        OriginalFilenameNonVersionableAttribute.exe

                                        Network Behavior

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 25, 2021 08:59:30.885272026 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:30.930377960 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:30.930645943 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:30.980669022 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:30.981647015 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.026617050 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.026638985 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.026930094 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.072876930 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.117345095 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.168613911 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.168642998 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.168652058 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.168895960 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.179493904 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.224597931 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.264990091 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.291666985 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.336853981 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.336878061 CET58749737213.165.67.118192.168.2.3
                                        Feb 25, 2021 08:59:31.336990118 CET49737587192.168.2.3213.165.67.118
                                        Feb 25, 2021 08:59:31.337100983 CET49737587192.168.2.3213.165.67.118

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Feb 25, 2021 08:57:54.432770967 CET5020053192.168.2.38.8.8.8
                                        Feb 25, 2021 08:57:54.482414007 CET53502008.8.8.8192.168.2.3
                                        Feb 25, 2021 08:57:54.956418991 CET5128153192.168.2.38.8.8.8
                                        Feb 25, 2021 08:57:55.024233103 CET53512818.8.8.8192.168.2.3
                                        Feb 25, 2021 08:57:55.177892923 CET4919953192.168.2.38.8.8.8
                                        Feb 25, 2021 08:57:55.226635933 CET53491998.8.8.8192.168.2.3
                                        Feb 25, 2021 08:57:55.392517090 CET5062053192.168.2.38.8.8.8
                                        Feb 25, 2021 08:57:55.444052935 CET53506208.8.8.8192.168.2.3
                                        Feb 25, 2021 08:57:57.056886911 CET6493853192.168.2.38.8.8.8
                                        Feb 25, 2021 08:57:57.105473042 CET53649388.8.8.8192.168.2.3
                                        Feb 25, 2021 08:57:58.407277107 CET6015253192.168.2.38.8.8.8
                                        Feb 25, 2021 08:57:58.467240095 CET53601528.8.8.8192.168.2.3
                                        Feb 25, 2021 08:57:59.686897993 CET5754453192.168.2.38.8.8.8
                                        Feb 25, 2021 08:57:59.735665083 CET53575448.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:02.530145884 CET5598453192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:02.579716921 CET53559848.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:03.326384068 CET6418553192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:03.376665115 CET53641858.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:24.511018038 CET6511053192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:25.509896994 CET6511053192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:25.562223911 CET53651108.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:26.551956892 CET5836153192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:26.602132082 CET53583618.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:29.230931997 CET6349253192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:29.288131952 CET53634928.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:29.408329010 CET6083153192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:29.461874008 CET53608318.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:30.104022026 CET6010053192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:30.155157089 CET53601008.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:31.018234015 CET5319553192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:31.067037106 CET53531958.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:31.747823000 CET5014153192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:31.809592009 CET53501418.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:31.922199965 CET5302353192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:31.971175909 CET53530238.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:33.155597925 CET4956353192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:33.204462051 CET53495638.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:35.681423903 CET5135253192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:35.734956980 CET53513528.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:36.691859961 CET5934953192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:36.743544102 CET53593498.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:37.720766068 CET5708453192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:37.769865036 CET53570848.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:39.077197075 CET5882353192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:39.125957966 CET53588238.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:39.949260950 CET5756853192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:39.998086929 CET53575688.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:43.294401884 CET5054053192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:43.363955975 CET53505408.8.8.8192.168.2.3
                                        Feb 25, 2021 08:58:51.368130922 CET5436653192.168.2.38.8.8.8
                                        Feb 25, 2021 08:58:51.438606024 CET53543668.8.8.8192.168.2.3
                                        Feb 25, 2021 08:59:05.859128952 CET5303453192.168.2.38.8.8.8
                                        Feb 25, 2021 08:59:05.908250093 CET53530348.8.8.8192.168.2.3
                                        Feb 25, 2021 08:59:08.623389959 CET5776253192.168.2.38.8.8.8
                                        Feb 25, 2021 08:59:08.681668043 CET53577628.8.8.8192.168.2.3
                                        Feb 25, 2021 08:59:30.794899940 CET5543553192.168.2.38.8.8.8
                                        Feb 25, 2021 08:59:30.857991934 CET53554358.8.8.8192.168.2.3
                                        Feb 25, 2021 08:59:41.252029896 CET5071353192.168.2.38.8.8.8
                                        Feb 25, 2021 08:59:41.305337906 CET53507138.8.8.8192.168.2.3
                                        Feb 25, 2021 08:59:42.680293083 CET5613253192.168.2.38.8.8.8
                                        Feb 25, 2021 08:59:42.754112959 CET53561328.8.8.8192.168.2.3

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        Feb 25, 2021 08:59:30.794899940 CET192.168.2.38.8.8.80x4cc6Standard query (0)smtp.ionos.esA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        Feb 25, 2021 08:59:30.857991934 CET8.8.8.8192.168.2.30x4cc6No error (0)smtp.ionos.es213.165.67.118A (IP address)IN (0x0001)
                                        Feb 25, 2021 08:59:30.857991934 CET8.8.8.8192.168.2.30x4cc6No error (0)smtp.ionos.es213.165.67.102A (IP address)IN (0x0001)

                                        SMTP Packets

                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Feb 25, 2021 08:59:30.980669022 CET58749737213.165.67.118192.168.2.3220 kundenserver.de (mreue107) Nemesis ESMTP Service ready
                                        Feb 25, 2021 08:59:30.981647015 CET49737587192.168.2.3213.165.67.118EHLO 506407
                                        Feb 25, 2021 08:59:31.026638985 CET58749737213.165.67.118192.168.2.3250-kundenserver.de Hello 506407 [84.17.52.78]
                                        250-8BITMIME
                                        250-AUTH LOGIN PLAIN
                                        250-SIZE 140000000
                                        250 STARTTLS
                                        Feb 25, 2021 08:59:31.026930094 CET49737587192.168.2.3213.165.67.118STARTTLS
                                        Feb 25, 2021 08:59:31.072876930 CET58749737213.165.67.118192.168.2.3220 OK

                                        Code Manipulations

                                        Statistics

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:08:57:59
                                        Start date:25/02/2021
                                        Path:C:\Users\user\Desktop\malware.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\Desktop\malware.exe'
                                        Imagebase:0x930000
                                        File size:543232 bytes
                                        MD5 hash:2EE5A68EE37AF14C612FC4C8A589858A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.201606646.000000000335E000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.201927296.00000000040B5000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:08:58:01
                                        Start date:25/02/2021
                                        Path:C:\Users\user\Desktop\malware.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\malware.exe
                                        Imagebase:0xef0000
                                        File size:543232 bytes
                                        MD5 hash:2EE5A68EE37AF14C612FC4C8A589858A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.459799944.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.465412261.00000000039D8000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.464476473.0000000003531000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        Disassembly

                                        Code Analysis

                                        Reset < >