Loading ...

Play interactive tourEdit tour

Analysis Report Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe

Overview

General Information

Sample Name:Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
Analysis ID:358268
MD5:d75e739d2c54d94cb846ddb1228cd0ce
SHA1:c5537c783e9be86b1deec8ab5bc58086b395fb85
SHA256:b38eaa5913624e88c5c8466dd9c448df0e7c112ec0a0126cbc0fed39d8c3f460
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (STR)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "FTP Info": "info@publigestion.esCG!)lmlbWlR;mail.publigestion.essmithrowe024@gmail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.245183520.0000000003D85000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000002.857483851.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.3f42078.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.4040728.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.4040728.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.3ee6058.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Antivirus / Scanner detection for submitted sampleShow sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeAvira: detected
                      Found malware configurationShow sources
                      Source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.4040728.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "FTP Info": "info@publigestion.esCG!)lmlbWlR;mail.publigestion.essmithrowe024@gmail.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeVirustotal: Detection: 34%Perma Link
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeReversingLabs: Detection: 65%
                      Machine Learning detection for sampleShow sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeJoe Sandbox ML: detected
                      Source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.930000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen3
                      Source: 3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

                      Compliance:

                      barindex
                      Uses 32bit PE filesShow sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 4x nop then mov ecx, 05B32068h
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49741 -> 151.80.237.40:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49742 -> 151.80.237.40:587
                      Source: global trafficTCP traffic: 192.168.2.5:49741 -> 151.80.237.40:587
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: global trafficTCP traffic: 192.168.2.5:49741 -> 151.80.237.40:587
                      Source: unknownDNS traffic detected: queries for: mail.publigestion.es
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmp, Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000003.467730826.0000000000954000.00000004.00000001.sdmp, Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.868691117.0000000002AEB000.00000004.00000001.sdmpString found in binary or memory: http://JA5BR3vESJ4HIbjJvXk.com
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpString found in binary or memory: http://JA5BR3vESJ4HIbjJvXk.com$0
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpString found in binary or memory: http://jWednt.com
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.868878460.0000000002AFC000.00000004.00000001.sdmpString found in binary or memory: http://mail.publigestion.es
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.868878460.0000000002AFC000.00000004.00000001.sdmpString found in binary or memory: http://publigestion.es
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.243631481.0000000002D31000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245183520.0000000003D85000.00000004.00000001.sdmp, Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.857483851.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bA98C8B4Eu002d569Au002d4A19u002d8A30u002dFCB6C4F1F1FEu007d/u00387327D30u002d23EBu002d4F2Du002d8A59u002d713C15DA7861.csLarge array initialization: .cctor: array initializer size 11979
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      PE file contains section with special charsShow sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: section name: w}j^wL
                      PE file has nameless sectionsShow sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0093D21B
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_01200472
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_01201191
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0120C0B0
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0120EA90
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0E96B331
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0E96001D
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0E960040
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_009338AA
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_009229A9
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_009287A0
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00921328
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_0092131B
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00929B00
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00C36180
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00C368B8
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00C35B48
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00C3D8A0
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_027547A0
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_02753CCC
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_027546B0
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeBinary or memory string: OriginalFilename vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.250567986.000000000E830000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.242456279.00000000009B4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDynamicPropertyHolder.exeF vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245183520.0000000003D85000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemzZscfeYPIBpCXgJVuJpxSS.exe4 vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.249479351.00000000063B1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863753632.0000000000C40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000000.241504864.00000000004E4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDynamicPropertyHolder.exeF vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863666376.0000000000C00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.862794034.0000000000B0A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.857483851.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemzZscfeYPIBpCXgJVuJpxSS.exe4 vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.859461914.00000000008F8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeBinary or memory string: OriginalFilenameDynamicPropertyHolder.exeF vs Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: Section: w}j^wL ZLIB complexity 1.00046164773
                      Source: 3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@4/1
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeVirustotal: Detection: 34%
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeReversingLabs: Detection: 65%
                      Source: unknownProcess created: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe 'C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe'
                      Source: unknownProcess created: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess created: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeUnpacked PE file: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.930000.0.unpack w}j^wL:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                      Binary contains a suspicious time stampShow sources
                      Source: initial sampleStatic PE information: 0x87A5DBC2 [Wed Feb 12 04:57:38 2042 UTC]
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: section name: w}j^wL
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0E9656BE push cs; ret
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0E965501 push cs; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0E964AC8 push edx; ret
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_0E960006 push cs; ret
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_004742CE push cs; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_004742A4 push cs; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_004742BC push cs; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_0047475A push ss; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00474760 push ss; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00474772 push ss; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00473B7E push es; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_0047477E push ss; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00473D7C push es; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00474B14 push ds; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_0047431C push cs; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00473DC4 push es; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00474BCE push ds; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_004747D2 push ss; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00473DE8 push es; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00473D8E push es; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_0047478A push ss; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_0047479C push ss; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00473DA6 push es; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00474BB6 push ds; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00474BB0 push ds; retf
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00C333D8 push esp; iretd
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00C34A58 push ss; ret
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_00C3ABAC push FFFFFFA5h; ret
                      Source: initial sampleStatic PE information: section name: w}j^wL entropy: 7.99679450535
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.84946737219
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile created: \documentaci#u00f3n bancaria - caja rural de zamora 24.02.21.exe
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM_3Show sources
                      Source: Yara matchFile source: 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe PID: 4356, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_004750A2 str word ptr [ebx]
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWindow / User API: threadDelayed 4084
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWindow / User API: threadDelayed 5695
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe TID: 5472Thread sleep time: -104541s >= -30000s
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe TID: 6100Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe TID: 5240Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe TID: 5924Thread sleep time: -23058430092136925s >= -30000s
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe TID: 496Thread sleep count: 4084 > 30
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe TID: 496Thread sleep count: 5695 > 30
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe TID: 5924Thread sleep count: 32 > 30
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863611478.0000000000BE1000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess information queried: ProcessInformation

                      Anti Debugging:

                      barindex
                      Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 1_2_01200F70 CheckRemoteDebuggerPresent,
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeCode function: 3_2_0092BA10 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeMemory written: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeProcess created: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863960017.0000000001220000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863960017.0000000001220000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863960017.0000000001220000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863960017.0000000001220000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.863960017.0000000001220000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.245183520.0000000003D85000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.857483851.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe PID: 5452, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe PID: 4356, type: MEMORY
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.3f42078.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.4040728.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.4040728.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.3ee6058.1.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe PID: 5452, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.245183520.0000000003D85000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.857483851.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe PID: 5452, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe PID: 4356, type: MEMORY
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.3f42078.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.4040728.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.4040728.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.3ee6058.1.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Disable or Modify Tools1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1Input Capture11Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Credentials in Registry1Security Software Discovery321SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing14NTDSVirtualization/Sandbox Evasion15Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion15DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe34%VirustotalBrowse
                      Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe100%AviraHEUR/AGEN.1138558
                      Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      3.0.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.460000.0.unpack100%AviraHEUR/AGEN.1138558Download File
                      1.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.930000.0.unpack100%AviraTR/Crypt.XPACK.Gen3Download File
                      1.0.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.930000.0.unpack100%AviraHEUR/AGEN.1138558Download File
                      3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.460000.1.unpack100%AviraHEUR/AGEN.1138558Download File
                      3.2.Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://jWednt.com0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://mail.publigestion.es0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://JA5BR3vESJ4HIbjJvXk.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://JA5BR3vESJ4HIbjJvXk.com$00%Avira URL Cloudsafe
                      http://publigestion.es0%Avira URL Cloudsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      publigestion.es
                      151.80.237.40
                      truetrue
                        unknown
                        mail.publigestion.es
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://jWednt.comDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://127.0.0.1:HTTP/1.1Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://mail.publigestion.esDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.868878460.0000000002AFC000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://DynDns.comDynDNSDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://JA5BR3vESJ4HIbjJvXk.comDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmp, Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000003.467730826.0000000000954000.00000004.00000001.sdmp, Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.868691117.0000000002AEB000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://api.ipify.org%GETMozilla/5.0Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          http://JA5BR3vESJ4HIbjJvXk.com$0Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://publigestion.esDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.868878460.0000000002AFC000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.243631481.0000000002D31000.00000004.00000001.sdmpfalse
                            high
                            https://api.ipify.org%Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            low
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245183520.0000000003D85000.00000004.00000001.sdmp, Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000003.00000002.857483851.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssDocumentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe, 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmpfalse
                              high

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              151.80.237.40
                              unknownItaly
                              16276OVHFRtrue

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:358268
                              Start date:25.02.2021
                              Start time:11:20:54
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 11m 25s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:30
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/2@4/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 0% (good quality ratio 0%)
                              • Quality average: 0%
                              • Quality standard deviation: 0%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, RuntimeBroker.exe, backgroundTaskHost.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, WMIADAP.exe, MusNotifyIcon.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 13.88.21.125, 92.122.145.220, 104.43.193.48, 40.88.32.150, 23.218.208.56, 51.104.144.132, 67.26.75.254, 8.253.207.120, 8.248.147.254, 67.27.158.254, 8.248.137.254, 51.103.5.159, 92.122.213.194, 92.122.213.247, 52.155.217.156, 20.54.26.129, 20.190.160.8, 20.190.160.67, 20.190.160.136, 20.190.160.4, 20.190.160.69, 20.190.160.2, 20.190.160.71, 20.190.160.75, 93.184.220.29, 51.11.168.232, 20.49.150.241
                              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, cs9.wac.phicdn.net, www.tm.lg.prod.aadmsa.akadns.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, ocsp.digicert.com, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, www.tm.a.prd.aadg.akadns.net, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, settingsfd-geo.trafficmanager.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              11:21:50API Interceptor1811x Sleep call for process: Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              OVHFREMG 3.0.exeGet hashmaliciousBrowse
                              • 51.79.194.87
                              p1FlmOJga0.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              FMNmcUzUPI.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              GJosvjlbb2.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              K2vYR8W2ij.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              xohwGrj1Xk.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              NmsNGsSoxu.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              gbvtZpxuoR.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              1Bt27GiVoN.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              xf9hBfVbF1.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              2101-0006N.exeGet hashmaliciousBrowse
                              • 66.70.204.222
                              shwy5yEWhy.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              Uqmp5blmuq.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              X9Gc4DbGG8.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              jNHhtYcfwM.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              auHUCmZNF1.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              zE32Emlq4c.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              DWUoew53fZ.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              Ewf1OuzHwS.dllGet hashmaliciousBrowse
                              • 91.121.94.86
                              8nfvfGmwd9.dllGet hashmaliciousBrowse
                              • 91.121.94.86

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe.log
                              Process:C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1400
                              Entropy (8bit):5.344635889251176
                              Encrypted:false
                              SSDEEP:24:ML9E4Ks2f84jE4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEg:MxHKXfvjHKx1qHiYHKhQnoPtHoxHhAHV
                              MD5:CDB0CBEDFEC7CCD7229835F37D89305C
                              SHA1:39023F8CFF044D44485DB049CE242383BCB07035
                              SHA-256:B1D78A56636298EFB329B368C4D52F2DCCF7F948AF7E7A30D9A8916D532760FE
                              SHA-512:35066E4F12E28DA041B4EE5BE8E24B21A1FBF6D3267100EFA4EEC701288F48F5BA4E63A4866D1DEC3E1A8147A060B9E0D4C4D4A2FB49890AA617172AE4BFA764
                              Malicious:true
                              Reputation:moderate, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                              C:\Users\user\AppData\Roaming\xjxky1v5.hu2\Chrome\Default\Cookies
                              Process:C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3032001
                              Category:dropped
                              Size (bytes):20480
                              Entropy (8bit):0.698304057893793
                              Encrypted:false
                              SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoIL4rtEy80:T5LLOpEO5J/Kn7U1uBoI+j
                              MD5:3806E8153A55C1A2DA0B09461A9C882A
                              SHA1:BD98AB2FB5E18FD94DC24BCE875087B5C3BB2F72
                              SHA-256:366E8B53CE8CC27C0980AC532C2E9D372399877931AB0CEA075C62B3CB0F82BE
                              SHA-512:31E96CC89795D80390432062466D542DBEA7DF31E3E8676DF370381BEDC720948085AD495A735FBDB75071DE45F3B8E470D809E863664990A79DEE8ADC648F1C
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.853928366861313
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              • Win32 Executable (generic) a (10002005/4) 49.96%
                              • Win16/32 Executable Delphi generic (2074/23) 0.01%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                              File size:529920
                              MD5:d75e739d2c54d94cb846ddb1228cd0ce
                              SHA1:c5537c783e9be86b1deec8ab5bc58086b395fb85
                              SHA256:b38eaa5913624e88c5c8466dd9c448df0e7c112ec0a0126cbc0fed39d8c3f460
                              SHA512:17f7c1a68bcbbbda951ab13fa78d7d453f3dad6a8201b144fda46f20047317a8acdac3881053efbc50d1c288009452c4ba678b4361451c7c2f4dd282cdb478e7
                              SSDEEP:12288:YC19fAXhW7qQuT16haOTMTtulAzJ306c5iAFh9+:D19f4hW2Qup6wOTstyAzJMwAr
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P..,................... ....@.. ....................................@................................

                              File Icon

                              Icon Hash:00828e8e8686b000

                              Static PE Info

                              General

                              Entrypoint:0x48800a
                              Entrypoint Section:
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x87A5DBC2 [Wed Feb 12 04:57:38 2042 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00488000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x103c40x57.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x840000x638.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x880000x8
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x100000x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              w}j^wL0x20000xdb8c0xdc00False1.00046164773data7.99679450535IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .text0x100000x729480x72a00False0.88547701404data7.84946737219IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x840000x6380x800False0.34130859375data3.50979497099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x860000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              0x880000x100x200False0.044921875data0.122275881259IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0x840a00x3a8data
                              RT_MANIFEST0x844480x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright Hotplates 2020-2021
                              Assembly Version2.0.9.0
                              InternalNameDynamicPropertyHolder.exe
                              FileVersion2.0.9.0
                              CompanyNameHotplates
                              LegalTrademarks
                              CommentsMLT
                              ProductNameMedical Laboratory
                              ProductVersion2.0.9.0
                              FileDescriptionMedical Laboratory
                              OriginalFilenameDynamicPropertyHolder.exe

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              02/25/21-11:23:41.652784TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49741587192.168.2.5151.80.237.40
                              02/25/21-11:23:45.709350TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49742587192.168.2.5151.80.237.40

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Feb 25, 2021 11:23:40.182836056 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:40.234313011 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:40.234473944 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.215612888 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.216160059 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.267694950 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.296730042 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.348573923 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.349245071 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.405221939 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.412411928 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.463936090 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.464483976 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.517613888 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.518053055 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.617088079 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.617124081 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.652784109 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.652959108 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.653033972 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.653115988 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:41.704384089 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.704437017 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.705837011 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:41.748981953 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:43.655505896 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:43.707983971 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:43.708233118 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:43.718151093 CET49741587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:43.769521952 CET58749741151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.285482883 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.336119890 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.336205006 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.390239000 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.390499115 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.440113068 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.440404892 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.490170956 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.490649939 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.542669058 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.542977095 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.592406034 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.592658997 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.643505096 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.643755913 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.693193913 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.693224907 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.709173918 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.709350109 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.709458113 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.709578991 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.709795952 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.709901094 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.709995031 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.710100889 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:23:45.758797884 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.759121895 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.759140015 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.759428024 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.760936022 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:23:45.811779022 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:25:19.649772882 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:25:19.702020884 CET58749742151.80.237.40192.168.2.5
                              Feb 25, 2021 11:25:19.702265024 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:25:19.702605963 CET49742587192.168.2.5151.80.237.40
                              Feb 25, 2021 11:25:19.753355026 CET58749742151.80.237.40192.168.2.5

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Feb 25, 2021 11:21:39.476377964 CET6206053192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:39.525214911 CET53620608.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:39.898612976 CET6180553192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:39.947323084 CET53618058.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:40.194750071 CET5479553192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:40.262618065 CET53547958.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:42.377831936 CET4955753192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:42.426700115 CET53495578.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:43.507566929 CET6173353192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:43.556627989 CET53617338.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:46.367276907 CET6544753192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:46.415833950 CET53654478.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:47.379300117 CET5244153192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:47.430773973 CET53524418.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:48.681478977 CET6217653192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:48.730254889 CET53621768.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:49.691289902 CET5959653192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:49.740421057 CET53595968.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:50.804085970 CET6529653192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:50.861043930 CET53652968.8.8.8192.168.2.5
                              Feb 25, 2021 11:21:52.197709084 CET6318353192.168.2.58.8.8.8
                              Feb 25, 2021 11:21:52.246304035 CET53631838.8.8.8192.168.2.5
                              Feb 25, 2021 11:22:03.150038004 CET6015153192.168.2.58.8.8.8
                              Feb 25, 2021 11:22:03.208589077 CET53601518.8.8.8192.168.2.5
                              Feb 25, 2021 11:22:13.516942978 CET5696953192.168.2.58.8.8.8
                              Feb 25, 2021 11:22:13.566200972 CET53569698.8.8.8192.168.2.5
                              Feb 25, 2021 11:22:34.690382957 CET5516153192.168.2.58.8.8.8
                              Feb 25, 2021 11:22:34.739236116 CET53551618.8.8.8192.168.2.5
                              Feb 25, 2021 11:22:35.358089924 CET5475753192.168.2.58.8.8.8
                              Feb 25, 2021 11:22:35.415616035 CET53547578.8.8.8192.168.2.5
                              Feb 25, 2021 11:22:37.598196030 CET4999253192.168.2.58.8.8.8
                              Feb 25, 2021 11:22:37.646925926 CET53499928.8.8.8192.168.2.5
                              Feb 25, 2021 11:22:46.975919962 CET6007553192.168.2.58.8.8.8
                              Feb 25, 2021 11:22:47.034534931 CET53600758.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:07.385647058 CET5501653192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:07.444818974 CET53550168.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:08.118201971 CET6434553192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:08.181802034 CET53643458.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:08.874814034 CET5712853192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:08.932379961 CET53571288.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:09.420785904 CET5479153192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:09.501914978 CET53547918.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:09.578149080 CET5046353192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:09.644718885 CET53504638.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:10.066114902 CET5039453192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:10.123738050 CET53503948.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:10.705328941 CET5853053192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:10.762413979 CET53585308.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:11.376960039 CET5381353192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:11.436109066 CET53538138.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:12.474190950 CET6373253192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:12.525695086 CET53637328.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:14.183902025 CET5734453192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:14.245465994 CET53573448.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:14.887217045 CET5445053192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:14.938749075 CET53544508.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:39.870362997 CET5926153192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:39.943589926 CET53592618.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:39.961500883 CET5715153192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:40.056440115 CET53571518.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:44.456857920 CET5941353192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:44.536700964 CET53594138.8.8.8192.168.2.5
                              Feb 25, 2021 11:23:45.223028898 CET6051653192.168.2.58.8.8.8
                              Feb 25, 2021 11:23:45.283976078 CET53605168.8.8.8192.168.2.5
                              Feb 25, 2021 11:26:35.526266098 CET5164953192.168.2.58.8.8.8
                              Feb 25, 2021 11:26:35.583487034 CET53516498.8.8.8192.168.2.5
                              Feb 25, 2021 11:26:35.852231979 CET6508653192.168.2.58.8.8.8
                              Feb 25, 2021 11:26:35.903703928 CET53650868.8.8.8192.168.2.5
                              Feb 25, 2021 11:26:36.460910082 CET5643253192.168.2.58.8.8.8
                              Feb 25, 2021 11:26:36.517954111 CET53564328.8.8.8192.168.2.5
                              Feb 25, 2021 11:26:38.899626017 CET5292953192.168.2.58.8.8.8
                              Feb 25, 2021 11:26:38.956767082 CET53529298.8.8.8192.168.2.5

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Feb 25, 2021 11:23:39.870362997 CET192.168.2.58.8.8.80x4c87Standard query (0)mail.publigestion.esA (IP address)IN (0x0001)
                              Feb 25, 2021 11:23:39.961500883 CET192.168.2.58.8.8.80x7971Standard query (0)mail.publigestion.esA (IP address)IN (0x0001)
                              Feb 25, 2021 11:23:44.456857920 CET192.168.2.58.8.8.80x2661Standard query (0)mail.publigestion.esA (IP address)IN (0x0001)
                              Feb 25, 2021 11:23:45.223028898 CET192.168.2.58.8.8.80xf0f5Standard query (0)mail.publigestion.esA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Feb 25, 2021 11:23:39.943589926 CET8.8.8.8192.168.2.50x4c87No error (0)mail.publigestion.espubligestion.esCNAME (Canonical name)IN (0x0001)
                              Feb 25, 2021 11:23:39.943589926 CET8.8.8.8192.168.2.50x4c87No error (0)publigestion.es151.80.237.40A (IP address)IN (0x0001)
                              Feb 25, 2021 11:23:40.056440115 CET8.8.8.8192.168.2.50x7971No error (0)mail.publigestion.espubligestion.esCNAME (Canonical name)IN (0x0001)
                              Feb 25, 2021 11:23:40.056440115 CET8.8.8.8192.168.2.50x7971No error (0)publigestion.es151.80.237.40A (IP address)IN (0x0001)
                              Feb 25, 2021 11:23:44.536700964 CET8.8.8.8192.168.2.50x2661No error (0)mail.publigestion.espubligestion.esCNAME (Canonical name)IN (0x0001)
                              Feb 25, 2021 11:23:44.536700964 CET8.8.8.8192.168.2.50x2661No error (0)publigestion.es151.80.237.40A (IP address)IN (0x0001)
                              Feb 25, 2021 11:23:45.283976078 CET8.8.8.8192.168.2.50xf0f5No error (0)mail.publigestion.espubligestion.esCNAME (Canonical name)IN (0x0001)
                              Feb 25, 2021 11:23:45.283976078 CET8.8.8.8192.168.2.50xf0f5No error (0)publigestion.es151.80.237.40A (IP address)IN (0x0001)
                              Feb 25, 2021 11:26:35.583487034 CET8.8.8.8192.168.2.50xf017No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)

                              SMTP Packets

                              TimestampSource PortDest PortSource IPDest IPCommands
                              Feb 25, 2021 11:23:41.215612888 CET58749741151.80.237.40192.168.2.5220-dns1.servidortierra.com ESMTP Exim 4.93 #2 Thu, 25 Feb 2021 11:23:41 +0100
                              220-We do not authorize the use of this system to transport unsolicited,
                              220 and/or bulk e-mail.
                              Feb 25, 2021 11:23:41.216160059 CET49741587192.168.2.5151.80.237.40EHLO 124406
                              Feb 25, 2021 11:23:41.267694950 CET58749741151.80.237.40192.168.2.5250-dns1.servidortierra.com Hello 124406 [84.17.52.78]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-AUTH PLAIN LOGIN
                              250-STARTTLS
                              250 HELP
                              Feb 25, 2021 11:23:41.296730042 CET49741587192.168.2.5151.80.237.40AUTH login aW5mb0BwdWJsaWdlc3Rpb24uZXM=
                              Feb 25, 2021 11:23:41.348573923 CET58749741151.80.237.40192.168.2.5334 UGFzc3dvcmQ6
                              Feb 25, 2021 11:23:41.405221939 CET58749741151.80.237.40192.168.2.5235 Authentication succeeded
                              Feb 25, 2021 11:23:41.412411928 CET49741587192.168.2.5151.80.237.40MAIL FROM:<info@publigestion.es>
                              Feb 25, 2021 11:23:41.463936090 CET58749741151.80.237.40192.168.2.5250 OK
                              Feb 25, 2021 11:23:41.464483976 CET49741587192.168.2.5151.80.237.40RCPT TO:<smithrowe024@gmail.com>
                              Feb 25, 2021 11:23:41.517613888 CET58749741151.80.237.40192.168.2.5250 Accepted
                              Feb 25, 2021 11:23:41.518053055 CET49741587192.168.2.5151.80.237.40DATA
                              Feb 25, 2021 11:23:41.617124081 CET58749741151.80.237.40192.168.2.5354 Enter message, ending with "." on a line by itself
                              Feb 25, 2021 11:23:41.653115988 CET49741587192.168.2.5151.80.237.40.
                              Feb 25, 2021 11:23:41.705837011 CET58749741151.80.237.40192.168.2.5250 OK id=1lFDo5-0004Nf-JT
                              Feb 25, 2021 11:23:43.655505896 CET49741587192.168.2.5151.80.237.40QUIT
                              Feb 25, 2021 11:23:43.707983971 CET58749741151.80.237.40192.168.2.5221 dns1.servidortierra.com closing connection
                              Feb 25, 2021 11:23:45.390239000 CET58749742151.80.237.40192.168.2.5220-dns1.servidortierra.com ESMTP Exim 4.93 #2 Thu, 25 Feb 2021 11:23:45 +0100
                              220-We do not authorize the use of this system to transport unsolicited,
                              220 and/or bulk e-mail.
                              Feb 25, 2021 11:23:45.390499115 CET49742587192.168.2.5151.80.237.40EHLO 124406
                              Feb 25, 2021 11:23:45.440113068 CET58749742151.80.237.40192.168.2.5250-dns1.servidortierra.com Hello 124406 [84.17.52.78]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-AUTH PLAIN LOGIN
                              250-STARTTLS
                              250 HELP
                              Feb 25, 2021 11:23:45.440404892 CET49742587192.168.2.5151.80.237.40AUTH login aW5mb0BwdWJsaWdlc3Rpb24uZXM=
                              Feb 25, 2021 11:23:45.490170956 CET58749742151.80.237.40192.168.2.5334 UGFzc3dvcmQ6
                              Feb 25, 2021 11:23:45.542669058 CET58749742151.80.237.40192.168.2.5235 Authentication succeeded
                              Feb 25, 2021 11:23:45.542977095 CET49742587192.168.2.5151.80.237.40MAIL FROM:<info@publigestion.es>
                              Feb 25, 2021 11:23:45.592406034 CET58749742151.80.237.40192.168.2.5250 OK
                              Feb 25, 2021 11:23:45.592658997 CET49742587192.168.2.5151.80.237.40RCPT TO:<smithrowe024@gmail.com>
                              Feb 25, 2021 11:23:45.643505096 CET58749742151.80.237.40192.168.2.5250 Accepted
                              Feb 25, 2021 11:23:45.643755913 CET49742587192.168.2.5151.80.237.40DATA
                              Feb 25, 2021 11:23:45.693224907 CET58749742151.80.237.40192.168.2.5354 Enter message, ending with "." on a line by itself
                              Feb 25, 2021 11:23:45.710100889 CET49742587192.168.2.5151.80.237.40.
                              Feb 25, 2021 11:23:45.760936022 CET58749742151.80.237.40192.168.2.5250 OK id=1lFDo9-0004Pa-Lv
                              Feb 25, 2021 11:25:19.649772882 CET49742587192.168.2.5151.80.237.40QUIT
                              Feb 25, 2021 11:25:19.702020884 CET58749742151.80.237.40192.168.2.5221 dns1.servidortierra.com closing connection

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:11:21:47
                              Start date:25/02/2021
                              Path:C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe'
                              Imagebase:0x930000
                              File size:529920 bytes
                              MD5 hash:D75E739D2C54D94CB846DDB1228CD0CE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.245183520.0000000003D85000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.245063314.0000000003160000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:11:21:51
                              Start date:25/02/2021
                              Path:C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\Documentaci#U00f3n Bancaria - Caja Rural de Zamora 24.02.21.exe
                              Imagebase:0x460000
                              File size:529920 bytes
                              MD5 hash:D75E739D2C54D94CB846DDB1228CD0CE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.864608914.0000000002821000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.857483851.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >