Loading ...

Play interactive tourEdit tour

Analysis Report NDKr3inJa9dXEu3.exe

Overview

General Information

Sample Name:NDKr3inJa9dXEu3.exe
Analysis ID:358345
MD5:c52d827c2b63af9a81b1328a2c027cd7
SHA1:397dba569945139e35a83d27fcddf6dc59b8570d
SHA256:63e89e3a9aa5843b13a2148eb97a2a2168f15953ec31a31d819b29e770bb7ac0
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • NDKr3inJa9dXEu3.exe (PID: 2148 cmdline: 'C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe' MD5: C52D827C2B63AF9A81B1328A2C027CD7)
    • schtasks.exe (PID: 6120 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • NDKr3inJa9dXEu3.exe (PID: 5464 cmdline: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe MD5: C52D827C2B63AF9A81B1328A2C027CD7)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "FTP Info": "admin@estagold.com.myestagold202584mail.estagold.com.mybmathena@accesesdata.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.208485443.0000000003D57000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.465125878.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 5 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.NDKr3inJa9dXEu3.exe.3daa5c0.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.NDKr3inJa9dXEu3.exe.2b20560.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                4.2.NDKr3inJa9dXEu3.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.NDKr3inJa9dXEu3.exe.3daa5c0.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                    Sigma Overview

                    System Summary:

                    barindex
                    Sigma detected: Scheduled temp file as task from temp locationShow sources
                    Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe' , ParentImage: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe, ParentProcessId: 2148, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp', ProcessId: 6120

                    Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Found malware configurationShow sources
                    Source: 1.2.NDKr3inJa9dXEu3.exe.3daa5c0.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "FTP Info": "admin@estagold.com.myestagold202584mail.estagold.com.mybmathena@accesesdata.com"}
                    Multi AV Scanner detection for submitted fileShow sources
                    Source: NDKr3inJa9dXEu3.exeVirustotal: Detection: 23%Perma Link
                    Machine Learning detection for dropped fileShow sources
                    Source: C:\Users\user\AppData\Roaming\WnAbgkeoRZ.exeJoe Sandbox ML: detected
                    Machine Learning detection for sampleShow sources
                    Source: NDKr3inJa9dXEu3.exeJoe Sandbox ML: detected
                    Source: 4.2.NDKr3inJa9dXEu3.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

                    Compliance:

                    barindex
                    Uses 32bit PE filesShow sources
                    Source: NDKr3inJa9dXEu3.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                    Source: NDKr3inJa9dXEu3.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking:

                    barindex
                    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49740 -> 103.6.196.156:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49741 -> 103.6.196.156:587
                    Source: global trafficTCP traffic: 192.168.2.3:49740 -> 103.6.196.156:587
                    Source: Joe Sandbox ViewIP Address: 103.6.196.156 103.6.196.156
                    Source: Joe Sandbox ViewASN Name: EXABYTES-AS-APExaBytesNetworkSdnBhdMY EXABYTES-AS-APExaBytesNetworkSdnBhdMY
                    Source: global trafficTCP traffic: 192.168.2.3:49740 -> 103.6.196.156:587
                    Source: unknownDNS traffic detected: queries for: mail.estagold.com.my
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: http://d58Epg6G54Y2z.org
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.472593846.0000000003574000.00000004.00000001.sdmpString found in binary or memory: http://estagold.com.my
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.472593846.0000000003574000.00000004.00000001.sdmpString found in binary or memory: http://mail.estagold.com.my
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: http://vHuoap.com
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.208485443.0000000003D57000.00000004.00000001.sdmp, NDKr3inJa9dXEu3.exe, 00000004.00000002.465125878.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                    System Summary:

                    barindex
                    .NET source code contains very large array initializationsShow sources
                    Source: 4.2.NDKr3inJa9dXEu3.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b0A69782Cu002dCC38u002d4531u002d980Du002d15391B4A1CA5u007d/u00305C1E7E3u002d84D2u002d49AEu002d9CDBu002d7125A6AE99F0.csLarge array initialization: .cctor: array initializer size 11963
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 1_2_00F2C888
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 1_2_00F2AED4
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_0143C968
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_01432520
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_01430040
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_014366B1
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_0143C570
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_0143D8B0
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016E1908
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016E299C
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016E0040
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016EB7E8
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016E5E10
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016E0022
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016EAF98
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_016EF230
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_032747A0
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_03273CCC
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_03274730
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_03274750
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_032746B0
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_032746F0
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_03275490
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_0327D820
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_06696C68
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_066994F8
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_06697538
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_06696920
                    Source: NDKr3inJa9dXEu3.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: WnAbgkeoRZ.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.211264396.0000000005D10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.211484699.0000000006458000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignatureDescription.exe< vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.208485443.0000000003D57000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemVwpcvWDCJFhCKROeeZLxPCBImYvnKQqhjmag.exe4 vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.211550303.00000000067D0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.211746810.00000000068C0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.211746810.00000000068C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.466417006.0000000000FE4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDSASignatureDescription.exe< vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.466551814.0000000001198000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.465125878.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemVwpcvWDCJFhCKROeeZLxPCBImYvnKQqhjmag.exe4 vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.468991903.00000000016F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.469220197.00000000017B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.469131698.00000000017A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exeBinary or memory string: OriginalFilenameDSASignatureDescription.exe< vs NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 4.2.NDKr3inJa9dXEu3.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 4.2.NDKr3inJa9dXEu3.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@4/1
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile created: C:\Users\user\AppData\Roaming\WnAbgkeoRZ.exeJump to behavior
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeMutant created: \Sessions\1\BaseNamedObjects\EOvWcjvLJWhNJaPsmkEpkX
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6080:120:WilError_01
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5ED6.tmpJump to behavior
                    Source: NDKr3inJa9dXEu3.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                    Source: NDKr3inJa9dXEu3.exeVirustotal: Detection: 23%
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile read: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe 'C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe'
                    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp'
                    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp'
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess created: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: NDKr3inJa9dXEu3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: NDKr3inJa9dXEu3.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_01434DCC push es; ret
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_06698540 push es; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.00995424289
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.00995424289
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile created: C:\Users\user\AppData\Roaming\WnAbgkeoRZ.exeJump to dropped file

                    Boot Survival:

                    barindex
                    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp'
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion:

                    barindex
                    Yara detected AntiVM_3Show sources
                    Source: Yara matchFile source: 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NDKr3inJa9dXEu3.exe PID: 2148, type: MEMORY
                    Source: Yara matchFile source: 1.2.NDKr3inJa9dXEu3.exe.2b20560.1.raw.unpack, type: UNPACKEDPE
                    Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
                    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWindow / User API: threadDelayed 3247
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWindow / User API: threadDelayed 6565
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe TID: 2992Thread sleep time: -100139s >= -30000s
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe TID: 5492Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe TID: 6128Thread sleep time: -20291418481080494s >= -30000s
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe TID: 952Thread sleep count: 3247 > 30
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe TID: 952Thread sleep count: 6565 > 30
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe TID: 6128Thread sleep count: 39 > 30
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: vmware
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmpBinary or memory string: VMWARE
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware T<
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware T
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.468709042.0000000001668000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: NDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_01431790 LdrInitializeThunk,
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeMemory allocated: page read and write | page guard
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp'
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeProcess created: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.469892438.0000000001D00000.00000002.00000001.sdmpBinary or memory string: Program Manager
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.469892438.0000000001D00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.469892438.0000000001D00000.00000002.00000001.sdmpBinary or memory string: Progman
                    Source: NDKr3inJa9dXEu3.exe, 00000004.00000002.469892438.0000000001D00000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeCode function: 4_2_0669516C GetUserNameW,
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000001.00000002.208485443.0000000003D57000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.465125878.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NDKr3inJa9dXEu3.exe PID: 5464, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NDKr3inJa9dXEu3.exe PID: 2148, type: MEMORY
                    Source: Yara matchFile source: 1.2.NDKr3inJa9dXEu3.exe.3daa5c0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.NDKr3inJa9dXEu3.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.NDKr3inJa9dXEu3.exe.3daa5c0.4.raw.unpack, type: UNPACKEDPE
                    Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Tries to harvest and steal browser information (history, passwords, etc)Show sources
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Tries to harvest and steal ftp login credentialsShow sources
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Tries to steal Mail credentials (via file access)Show sources
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\Desktop\NDKr3inJa9dXEu3.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Yara matchFile source: 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NDKr3inJa9dXEu3.exe PID: 5464, type: MEMORY

                    Remote Access Functionality:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000001.00000002.208485443.0000000003D57000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.465125878.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NDKr3inJa9dXEu3.exe PID: 5464, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NDKr3inJa9dXEu3.exe PID: 2148, type: MEMORY
                    Source: Yara matchFile source: 1.2.NDKr3inJa9dXEu3.exe.3daa5c0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.NDKr3inJa9dXEu3.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.NDKr3inJa9dXEu3.exe.3daa5c0.4.raw.unpack, type: UNPACKEDPE

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsWindows Management Instrumentation311Scheduled Task/Job1Process Injection12Disable or Modify Tools1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery114SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing2NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery321SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion24Cached Domain CredentialsVirtualization/Sandbox Evasion24VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection12DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 358345 Sample: NDKr3inJa9dXEu3.exe Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 31 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->31 33 Found malware configuration 2->33 35 Sigma detected: Scheduled temp file as task from temp location 2->35 37 8 other signatures 2->37 7 NDKr3inJa9dXEu3.exe 7 2->7         started        process3 file4 19 C:\Users\user\AppData\...\WnAbgkeoRZ.exe, PE32 7->19 dropped 21 C:\Users\...\WnAbgkeoRZ.exe:Zone.Identifier, ASCII 7->21 dropped 23 C:\Users\user\AppData\Local\...\tmp5ED6.tmp, XML 7->23 dropped 25 C:\Users\user\...25DKr3inJa9dXEu3.exe.log, ASCII 7->25 dropped 39 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 7->39 41 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->41 43 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->43 11 NDKr3inJa9dXEu3.exe 6 7->11         started        15 schtasks.exe 1 7->15         started        signatures5 process6 dnsIp7 27 estagold.com.my 103.6.196.156, 49740, 49741, 587 EXABYTES-AS-APExaBytesNetworkSdnBhdMY Malaysia 11->27 29 mail.estagold.com.my 11->29 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->45 47 Tries to steal Mail credentials (via file access) 11->47 49 Tries to harvest and steal ftp login credentials 11->49 51 Tries to harvest and steal browser information (history, passwords, etc) 11->51 17 conhost.exe 15->17         started        signatures8 process9

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    SourceDetectionScannerLabelLink
                    NDKr3inJa9dXEu3.exe24%VirustotalBrowse
                    NDKr3inJa9dXEu3.exe9%ReversingLabsWin32.Trojan.Wacatac
                    NDKr3inJa9dXEu3.exe100%Joe Sandbox ML

                    Dropped Files

                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\WnAbgkeoRZ.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\WnAbgkeoRZ.exe9%ReversingLabsWin32.Trojan.Wacatac

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    4.2.NDKr3inJa9dXEu3.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                    Domains

                    SourceDetectionScannerLabelLink
                    estagold.com.my0%VirustotalBrowse
                    mail.estagold.com.my1%VirustotalBrowse

                    URLs

                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://mail.estagold.com.my0%Avira URL Cloudsafe
                    http://vHuoap.com0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://d58Epg6G54Y2z.org0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://estagold.com.my0%Avira URL Cloudsafe

                    Domains and IPs

                    Contacted Domains

                    NameIPActiveMaliciousAntivirus DetectionReputation
                    estagold.com.my
                    103.6.196.156
                    truetrueunknown
                    mail.estagold.com.my
                    unknown
                    unknowntrueunknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1NDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSNDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://mail.estagold.com.myNDKr3inJa9dXEu3.exe, 00000004.00000002.472593846.0000000003574000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://vHuoap.comNDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haNDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://d58Epg6G54Y2z.orgNDKr3inJa9dXEu3.exe, 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpfalse
                      high
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipNDKr3inJa9dXEu3.exe, 00000001.00000002.208485443.0000000003D57000.00000004.00000001.sdmp, NDKr3inJa9dXEu3.exe, 00000004.00000002.465125878.0000000000402000.00000040.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssNDKr3inJa9dXEu3.exe, 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmpfalse
                        high
                        http://estagold.com.myNDKr3inJa9dXEu3.exe, 00000004.00000002.472593846.0000000003574000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        103.6.196.156
                        unknownMalaysia
                        46015EXABYTES-AS-APExaBytesNetworkSdnBhdMYtrue

                        General Information

                        Joe Sandbox Version:31.0.0 Emerald
                        Analysis ID:358345
                        Start date:25.02.2021
                        Start time:13:13:09
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 7m 52s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:NDKr3inJa9dXEu3.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:25
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@6/5@4/1
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 1% (good quality ratio 0.7%)
                        • Quality average: 45.7%
                        • Quality standard deviation: 36.4%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 104.42.151.234, 131.253.33.200, 13.107.22.200, 52.255.188.83, 104.43.193.48, 104.43.139.144, 51.104.139.180, 184.30.20.56, 20.54.26.129, 13.88.21.125, 8.253.95.249, 67.27.158.126, 8.248.139.254, 67.26.73.254, 8.248.115.254, 168.61.161.212, 13.64.90.137, 51.104.144.132, 92.122.213.194, 92.122.213.247
                        • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, skypedataprdcolcus16.cloudapp.net, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        13:13:55API Interceptor735x Sleep call for process: NDKr3inJa9dXEu3.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        103.6.196.156https://www.webveiviseren.no/statistikk/usage/Get hashmaliciousBrowse
                        • aunlianplastic.com/site_light/usage/owa/

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        EXABYTES-AS-APExaBytesNetworkSdnBhdMYPurchase List.exeGet hashmaliciousBrowse
                        • 103.6.196.156
                        RFQ- 978002410.exeGet hashmaliciousBrowse
                        • 103.6.196.138
                        CompensationClaim-46373845-02032021.xlsGet hashmaliciousBrowse
                        • 103.6.198.29
                        CompensationClaim-46373845-02032021.xlsGet hashmaliciousBrowse
                        • 103.6.198.29
                        bank TT slip.exeGet hashmaliciousBrowse
                        • 103.6.198.37
                        Request Quotation.exeGet hashmaliciousBrowse
                        • 103.6.198.37
                        bank details.exeGet hashmaliciousBrowse
                        • 103.6.198.37
                        Statement Of Account.exeGet hashmaliciousBrowse
                        • 103.6.196.175
                        3-321-68661.xlsGet hashmaliciousBrowse
                        • 103.6.196.88
                        Detailed 079.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Invoice_#_76493.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Notification #591501.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Notification #591501.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Notification #591501.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Report 290.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Report 290.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Report 290.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        Fax 740.xlsGet hashmaliciousBrowse
                        • 110.4.45.32
                        iZT2CEFqiVFCf9W.exeGet hashmaliciousBrowse
                        • 103.6.198.43
                        FFWMQQSH.EXEGet hashmaliciousBrowse
                        • 103.6.198.43

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NDKr3inJa9dXEu3.exe.log
                        Process:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):1406
                        Entropy (8bit):5.341099307467139
                        Encrypted:false
                        SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmER:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHg
                        MD5:E5FA1A53BA6D70E18192AF6AF7CFDBFA
                        SHA1:1C076481F11366751B8DA795C98A54DE8D1D82D5
                        SHA-256:1D7BAA6D3EB5A504FD4652BC01A0864DEE898D35D9E29D03EB4A60B0D6405D83
                        SHA-512:77850814E24DB48E3DDF9DF5B6A8110EE1A823BAABA800F89CD353EAC7F72E48B13F3F4A4DC8E5F0FAA707A7F14ED90577CF1CB106A0422F0BEDD1EFD2E940E4
                        Malicious:true
                        Reputation:moderate, very likely benign file
                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                        C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp
                        Process:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1643
                        Entropy (8bit):5.187928282029358
                        Encrypted:false
                        SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBjtn:cbh47TlNQ//rydbz9I3YODOLNdq3L
                        MD5:86DFB223E06A7EB192A19D6A1A5F5991
                        SHA1:245EBB6FEF323BA97AB0AEFB9F69DC25EB326D92
                        SHA-256:C3107DCD31C2E3AC283F48C2F2EC81A063ADCB4D5DD382B66F668D2DF303D87B
                        SHA-512:3C48C74E8C4C7A01A6AA4728E01A64CD1A4F56AD8B8A68FDB12D0AC7B39A2717B67E3EBEB72EDC65E6A2FE09DED1767AF252E8978E432DB4B5E35257AE87889F
                        Malicious:true
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                        C:\Users\user\AppData\Roaming\WnAbgkeoRZ.exe
                        Process:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):1024512
                        Entropy (8bit):6.795376997370158
                        Encrypted:false
                        SSDEEP:12288:K+rReYqTLTxRdnHpe1QFl1rHWd9yWXVa2A///vOq:DrReYqTXx7Je1QFl1rHeXVG/Z
                        MD5:C52D827C2B63AF9A81B1328A2C027CD7
                        SHA1:397DBA569945139E35A83D27FCDDF6DC59B8570D
                        SHA-256:63E89E3A9AA5843B13A2148EB97A2A2168F15953EC31A31D819B29E770BB7AC0
                        SHA-512:3974E79EB87DBD0DC18BBAB000E9FAC031CFECE7BF0132F211D07066032B434593B1B75AF74F4258E9963784D1F863DDC647496D2BD58759BE3D54FF9E7E4C69
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 9%
                        Reputation:low
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m7`..............P..............,... ........@.. ....................................@..................................,..K....@............................................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc..............................@..B.................,......H...........~...........................................................0..#.......+.&...(....(..........(.....o.....*..................0..........+.&..8......8.....+:...a.+....a....XE............"...X.....(m....+......&...+..8..&(m....+...&YE............(...7...Q...Z...c...l...u..........+.8~.....(.....4.8o.....(.....3.8`.....(.....2.8Q........&+.(....8<....7.87.....9.8......1.8%.....0.8......6.8......(....+..8.....5.8....*....0..........+.&...+$.."a.+..."a8s.....#Y+@..+...
                        C:\Users\user\AppData\Roaming\WnAbgkeoRZ.exe:Zone.Identifier
                        Process:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Reputation:high, very likely benign file
                        Preview: [ZoneTransfer]....ZoneId=0
                        C:\Users\user\AppData\Roaming\fqwupbgg.4et\Chrome\Default\Cookies
                        Process:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.6970840431455908
                        Encrypted:false
                        SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                        MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                        SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                        SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                        SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):6.795376997370158
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        File name:NDKr3inJa9dXEu3.exe
                        File size:1024512
                        MD5:c52d827c2b63af9a81b1328a2c027cd7
                        SHA1:397dba569945139e35a83d27fcddf6dc59b8570d
                        SHA256:63e89e3a9aa5843b13a2148eb97a2a2168f15953ec31a31d819b29e770bb7ac0
                        SHA512:3974e79eb87dbd0dc18bbab000e9fac031cfece7bf0132f211d07066032b434593b1b75af74f4258e9963784d1f863ddc647496d2bd58759be3d54ff9e7e4c69
                        SSDEEP:12288:K+rReYqTLTxRdnHpe1QFl1rHWd9yWXVa2A///vOq:DrReYqTXx7Je1QFl1rHeXVG/Z
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m7`..............P..............,... ........@.. ....................................@................................

                        File Icon

                        Icon Hash:206ae682a280a906

                        Static PE Info

                        General

                        Entrypoint:0x4d2cde
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x60376DFC [Thu Feb 25 09:29:32 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v4.0.30319
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                        Entrypoint Preview

                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xd2c900x4b.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x29000.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000xd0ce40xd0e00False0.592011940829data7.00995424289IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0xd40000x290000x29000False0.0339176829268data3.30773665372IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xfe0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_ICON0xd42e00x4f2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                        RT_ICON0xd47d40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 4278496986, next used block 4278496986
                        RT_ICON0xe4ffc0x94a8data
                        RT_ICON0xee4a40x5488data
                        RT_ICON0xf392c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0
                        RT_ICON0xf7b540x25a8data
                        RT_ICON0xfa0fc0x10a8data
                        RT_ICON0xfb1a40x988data
                        RT_ICON0xfbb2c0x468GLS_BINARY_LSB_FIRST
                        RT_GROUP_ICON0xfbf940x84data
                        RT_GROUP_ICON0xfc0180x14data
                        RT_VERSION0xfc02c0x368data
                        RT_MANIFEST0xfc3940xb15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                        Imports

                        DLLImport
                        mscoree.dll_CorExeMain

                        Version Infos

                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightCopyright 2014
                        Assembly Version3.0.0.0
                        InternalNameDSASignatureDescription.exe
                        FileVersion3.0.0.0
                        CompanyNameKTV
                        LegalTrademarks
                        Comments
                        ProductNameKTVManagement
                        ProductVersion3.0.0.0
                        FileDescriptionKTVManagement
                        OriginalFilenameDSASignatureDescription.exe

                        Network Behavior

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        02/25/21-13:15:39.408011TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49740587192.168.2.3103.6.196.156
                        02/25/21-13:15:43.573991TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49741587192.168.2.3103.6.196.156

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Feb 25, 2021 13:15:37.219960928 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:37.462656975 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:37.462773085 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:37.988204002 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:37.988688946 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:38.222326994 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:38.224571943 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:38.458317041 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:38.458898067 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:38.699927092 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:38.700957060 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:38.934817076 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:38.935199022 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:39.170259953 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:39.170469999 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:39.403994083 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:39.404026985 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:39.408010960 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:39.408222914 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:39.408355951 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:39.408499956 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:39.641700983 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:39.641877890 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:39.738096952 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:39.786835909 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:40.673029900 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:40.909938097 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:40.910262108 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:40.911627054 CET49740587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:41.132333994 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:41.145011902 CET58749740103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:41.359195948 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:41.359333038 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:42.196867943 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:42.197593927 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:42.424637079 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:42.425134897 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:42.652947903 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:42.653850079 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:42.884433031 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:42.886369944 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.115370035 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.115833044 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.344393015 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.344901085 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.571710110 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.571811914 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.573740005 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.573991060 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.574096918 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.574201107 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.574368954 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.574455023 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.574537992 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.574619055 CET49741587192.168.2.3103.6.196.156
                        Feb 25, 2021 13:15:43.803039074 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.803369999 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.803601027 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.897942066 CET58749741103.6.196.156192.168.2.3
                        Feb 25, 2021 13:15:43.943551064 CET49741587192.168.2.3103.6.196.156

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Feb 25, 2021 13:13:47.794286013 CET4919953192.168.2.38.8.8.8
                        Feb 25, 2021 13:13:47.844525099 CET53491998.8.8.8192.168.2.3
                        Feb 25, 2021 13:13:47.849242926 CET5062053192.168.2.38.8.8.8
                        Feb 25, 2021 13:13:47.900942087 CET53506208.8.8.8192.168.2.3
                        Feb 25, 2021 13:13:48.966368914 CET6493853192.168.2.38.8.8.8
                        Feb 25, 2021 13:13:49.015219927 CET53649388.8.8.8192.168.2.3
                        Feb 25, 2021 13:13:49.823757887 CET6015253192.168.2.38.8.8.8
                        Feb 25, 2021 13:13:49.875453949 CET53601528.8.8.8192.168.2.3
                        Feb 25, 2021 13:13:50.651333094 CET5754453192.168.2.38.8.8.8
                        Feb 25, 2021 13:13:50.700170994 CET53575448.8.8.8192.168.2.3
                        Feb 25, 2021 13:13:51.622975111 CET5598453192.168.2.38.8.8.8
                        Feb 25, 2021 13:13:51.672077894 CET53559848.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:21.063409090 CET6418553192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:21.112258911 CET53641858.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:23.213094950 CET6511053192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:23.265486956 CET53651108.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:26.502511978 CET5836153192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:26.572556019 CET53583618.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:39.245309114 CET6349253192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:39.310409069 CET53634928.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:42.618647099 CET6083153192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:42.671966076 CET53608318.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:43.174786091 CET6010053192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:43.224875927 CET53601008.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:45.860286951 CET5319553192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:45.908855915 CET53531958.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:47.382839918 CET5014153192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:47.434655905 CET53501418.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:48.567085981 CET5302353192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:48.615760088 CET53530238.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:49.699915886 CET4956353192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:49.749664068 CET53495638.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:50.645895958 CET5135253192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:50.697346926 CET53513528.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:53.509497881 CET5934953192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:53.561062098 CET53593498.8.8.8192.168.2.3
                        Feb 25, 2021 13:14:57.048566103 CET5708453192.168.2.38.8.8.8
                        Feb 25, 2021 13:14:57.098632097 CET53570848.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:02.154098034 CET5882353192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:02.212759972 CET53588238.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:14.683739901 CET5756853192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:14.735873938 CET53575688.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:15.841717005 CET5054053192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:15.890506029 CET53505408.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:16.807022095 CET5436653192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:16.858503103 CET53543668.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:22.443159103 CET5303453192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:22.493446112 CET53530348.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:23.283706903 CET5776253192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:23.344743967 CET53577628.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:32.037843943 CET5543553192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:32.086483955 CET53554358.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:34.483572960 CET5071353192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:34.553822041 CET53507138.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:36.720400095 CET5613253192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:36.902743101 CET53561328.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:36.916362047 CET5898753192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:37.112339973 CET53589878.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:40.963608027 CET5657953192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:41.020692110 CET53565798.8.8.8192.168.2.3
                        Feb 25, 2021 13:15:41.072596073 CET6063353192.168.2.38.8.8.8
                        Feb 25, 2021 13:15:41.129863977 CET53606338.8.8.8192.168.2.3

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Feb 25, 2021 13:15:36.720400095 CET192.168.2.38.8.8.80xa08fStandard query (0)mail.estagold.com.myA (IP address)IN (0x0001)
                        Feb 25, 2021 13:15:36.916362047 CET192.168.2.38.8.8.80x58beStandard query (0)mail.estagold.com.myA (IP address)IN (0x0001)
                        Feb 25, 2021 13:15:40.963608027 CET192.168.2.38.8.8.80x38f4Standard query (0)mail.estagold.com.myA (IP address)IN (0x0001)
                        Feb 25, 2021 13:15:41.072596073 CET192.168.2.38.8.8.80xc70bStandard query (0)mail.estagold.com.myA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Feb 25, 2021 13:15:36.902743101 CET8.8.8.8192.168.2.30xa08fNo error (0)mail.estagold.com.myestagold.com.myCNAME (Canonical name)IN (0x0001)
                        Feb 25, 2021 13:15:36.902743101 CET8.8.8.8192.168.2.30xa08fNo error (0)estagold.com.my103.6.196.156A (IP address)IN (0x0001)
                        Feb 25, 2021 13:15:37.112339973 CET8.8.8.8192.168.2.30x58beNo error (0)mail.estagold.com.myestagold.com.myCNAME (Canonical name)IN (0x0001)
                        Feb 25, 2021 13:15:37.112339973 CET8.8.8.8192.168.2.30x58beNo error (0)estagold.com.my103.6.196.156A (IP address)IN (0x0001)
                        Feb 25, 2021 13:15:41.020692110 CET8.8.8.8192.168.2.30x38f4No error (0)mail.estagold.com.myestagold.com.myCNAME (Canonical name)IN (0x0001)
                        Feb 25, 2021 13:15:41.020692110 CET8.8.8.8192.168.2.30x38f4No error (0)estagold.com.my103.6.196.156A (IP address)IN (0x0001)
                        Feb 25, 2021 13:15:41.129863977 CET8.8.8.8192.168.2.30xc70bNo error (0)mail.estagold.com.myestagold.com.myCNAME (Canonical name)IN (0x0001)
                        Feb 25, 2021 13:15:41.129863977 CET8.8.8.8192.168.2.30xc70bNo error (0)estagold.com.my103.6.196.156A (IP address)IN (0x0001)

                        SMTP Packets

                        TimestampSource PortDest PortSource IPDest IPCommands
                        Feb 25, 2021 13:15:37.988204002 CET58749740103.6.196.156192.168.2.3220-datousaurus.mschosting.com ESMTP Exim 4.93 #2 Thu, 25 Feb 2021 20:15:21 +0800
                        220-We do not authorize the use of this system to transport unsolicited,
                        220 and/or bulk e-mail.
                        Feb 25, 2021 13:15:37.988688946 CET49740587192.168.2.3103.6.196.156EHLO 910646
                        Feb 25, 2021 13:15:38.222326994 CET58749740103.6.196.156192.168.2.3250-datousaurus.mschosting.com Hello 910646 [84.17.52.78]
                        250-SIZE 52428800
                        250-8BITMIME
                        250-PIPELINING
                        250-AUTH PLAIN LOGIN
                        250-STARTTLS
                        250 HELP
                        Feb 25, 2021 13:15:38.224571943 CET49740587192.168.2.3103.6.196.156AUTH login YWRtaW5AZXN0YWdvbGQuY29tLm15
                        Feb 25, 2021 13:15:38.458317041 CET58749740103.6.196.156192.168.2.3334 UGFzc3dvcmQ6
                        Feb 25, 2021 13:15:38.699927092 CET58749740103.6.196.156192.168.2.3235 Authentication succeeded
                        Feb 25, 2021 13:15:38.700957060 CET49740587192.168.2.3103.6.196.156MAIL FROM:<admin@estagold.com.my>
                        Feb 25, 2021 13:15:38.934817076 CET58749740103.6.196.156192.168.2.3250 OK
                        Feb 25, 2021 13:15:38.935199022 CET49740587192.168.2.3103.6.196.156RCPT TO:<bmathena@accesesdata.com>
                        Feb 25, 2021 13:15:39.170259953 CET58749740103.6.196.156192.168.2.3250 Accepted
                        Feb 25, 2021 13:15:39.170469999 CET49740587192.168.2.3103.6.196.156DATA
                        Feb 25, 2021 13:15:39.404026985 CET58749740103.6.196.156192.168.2.3354 Enter message, ending with "." on a line by itself
                        Feb 25, 2021 13:15:39.408499956 CET49740587192.168.2.3103.6.196.156.
                        Feb 25, 2021 13:15:39.738096952 CET58749740103.6.196.156192.168.2.3250 OK id=1lFFYB-00CrHB-2O
                        Feb 25, 2021 13:15:40.673029900 CET49740587192.168.2.3103.6.196.156QUIT
                        Feb 25, 2021 13:15:40.909938097 CET58749740103.6.196.156192.168.2.3221 datousaurus.mschosting.com closing connection
                        Feb 25, 2021 13:15:42.196867943 CET58749741103.6.196.156192.168.2.3220-datousaurus.mschosting.com ESMTP Exim 4.93 #2 Thu, 25 Feb 2021 20:15:25 +0800
                        220-We do not authorize the use of this system to transport unsolicited,
                        220 and/or bulk e-mail.
                        Feb 25, 2021 13:15:42.197593927 CET49741587192.168.2.3103.6.196.156EHLO 910646
                        Feb 25, 2021 13:15:42.424637079 CET58749741103.6.196.156192.168.2.3250-datousaurus.mschosting.com Hello 910646 [84.17.52.78]
                        250-SIZE 52428800
                        250-8BITMIME
                        250-PIPELINING
                        250-AUTH PLAIN LOGIN
                        250-STARTTLS
                        250 HELP
                        Feb 25, 2021 13:15:42.425134897 CET49741587192.168.2.3103.6.196.156AUTH login YWRtaW5AZXN0YWdvbGQuY29tLm15
                        Feb 25, 2021 13:15:42.652947903 CET58749741103.6.196.156192.168.2.3334 UGFzc3dvcmQ6
                        Feb 25, 2021 13:15:42.884433031 CET58749741103.6.196.156192.168.2.3235 Authentication succeeded
                        Feb 25, 2021 13:15:42.886369944 CET49741587192.168.2.3103.6.196.156MAIL FROM:<admin@estagold.com.my>
                        Feb 25, 2021 13:15:43.115370035 CET58749741103.6.196.156192.168.2.3250 OK
                        Feb 25, 2021 13:15:43.115833044 CET49741587192.168.2.3103.6.196.156RCPT TO:<bmathena@accesesdata.com>
                        Feb 25, 2021 13:15:43.344393015 CET58749741103.6.196.156192.168.2.3250 Accepted
                        Feb 25, 2021 13:15:43.344901085 CET49741587192.168.2.3103.6.196.156DATA
                        Feb 25, 2021 13:15:43.571811914 CET58749741103.6.196.156192.168.2.3354 Enter message, ending with "." on a line by itself
                        Feb 25, 2021 13:15:43.574619055 CET49741587192.168.2.3103.6.196.156.
                        Feb 25, 2021 13:15:43.897942066 CET58749741103.6.196.156192.168.2.3250 OK id=1lFFYF-00CrHy-7w

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:13:13:54
                        Start date:25/02/2021
                        Path:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe'
                        Imagebase:0x700000
                        File size:1024512 bytes
                        MD5 hash:C52D827C2B63AF9A81B1328A2C027CD7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.208485443.0000000003D57000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.207036719.0000000002AF1000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.207090813.0000000002B34000.00000004.00000001.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:13:13:57
                        Start date:25/02/2021
                        Path:C:\Windows\SysWOW64\schtasks.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\WnAbgkeoRZ' /XML 'C:\Users\user\AppData\Local\Temp\tmp5ED6.tmp'
                        Imagebase:0xe60000
                        File size:185856 bytes
                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:13:13:58
                        Start date:25/02/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6b2800000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:13:13:58
                        Start date:25/02/2021
                        Path:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\Desktop\NDKr3inJa9dXEu3.exe
                        Imagebase:0xf10000
                        File size:1024512 bytes
                        MD5 hash:C52D827C2B63AF9A81B1328A2C027CD7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.465125878.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.470294179.00000000032C1000.00000004.00000001.sdmp, Author: Joe Security
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >