Loading ...

Play interactive tourEdit tour

Analysis Report PO45678.exe

Overview

General Information

Sample Name:PO45678.exe
Analysis ID:358415
MD5:0f3ca465173914c361362a754a6bf65e
SHA1:46dded33d12784afe77619a20ee65d1939f881b0
SHA256:400b1bf4c7139f7df22748d627aeb7789dd409ae463a0f8fb7d6fa243065d140
Tags:exeHostgator
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
.NET source code contains very large array initializations
Allocates memory in foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • PO45678.exe (PID: 6392 cmdline: 'C:\Users\user\Desktop\PO45678.exe' MD5: 0F3CA465173914C361362A754A6BF65E)
    • InstallUtil.exe (PID: 6708 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "FTP Info": "box@alscotop.comgodisgreatmail.privateemail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.262870817.0000000003D1A000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.490156222.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.263060829.0000000003E8B000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.PO45678.exe.3db3caa.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.PO45678.exe.3de9b8a.5.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.PO45678.exe.3e8b7da.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  4.2.InstallUtil.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.2.PO45678.exe.3e1fa5a.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 6 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.PO45678.exe.3e8b7da.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "FTP Info": "box@alscotop.comgodisgreatmail.privateemail.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PO45678.exeReversingLabs: Detection: 21%
                      Machine Learning detection for sampleShow sources
                      Source: PO45678.exeJoe Sandbox ML: detected
                      Source: 4.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

                      Compliance:

                      barindex
                      Uses 32bit PE filesShow sources
                      Source: PO45678.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
                      Source: PO45678.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Binary contains paths to debug symbolsShow sources
                      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000004.00000002.490827482.0000000000C82000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
                      Source: Binary string: InstallUtil.pdbJ source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmp
                      Source: Binary string: InstallUtil.pdb source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmp, InstallUtil.exe, InstallUtil.exe.0.dr
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then push dword ptr [ebp-20h]
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then push dword ptr [ebp-24h]
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then push dword ptr [ebp-20h]
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then xor edx, edx
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then xor edx, edx
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then push dword ptr [ebp-24h]
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then push dword ptr [ebp-24h]
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                      Source: unknownDNS traffic detected: queries for: mail.privateemail.com
                      Source: InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: http://SEqkTC.com
                      Source: InstallUtil.exe, 00000004.00000002.499962081.0000000006BB0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.c
                      Source: InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: InstallUtil.exe, 00000004.00000002.500007006.0000000006BDD000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                      Source: InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                      Source: InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpString found in binary or memory: http://mail.privateemail.com
                      Source: PO45678.exe, 00000000.00000003.244413137.0000000008EF3000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
                      Source: PO45678.exe, 00000000.00000003.256003842.0000000008EFB000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g%%
                      Source: PO45678.exe, 00000000.00000003.236907309.0000000008EF3000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g)
                      Source: InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmp, InstallUtil.exe, 00000004.00000002.495545429.0000000003270000.00000004.00000001.sdmpString found in binary or memory: http://oAv8kfbDtujMAmvvMu95.org
                      Source: InstallUtil.exe, 00000004.00000002.499962081.0000000006BB0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                      Source: PO45678.exe, 00000000.00000003.243870620.0000000000966000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
                      Source: InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
                      Source: PO45678.exe, 00000000.00000002.258461700.00000000024C2000.00000004.00000001.sdmp, PO45678.exe, 00000000.00000002.258539906.00000000024D8000.00000004.00000001.sdmpString found in binary or memory: http://schema.org/WebPage
                      Source: PO45678.exe, 00000000.00000002.258342945.0000000002491000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%H
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
                      Source: InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: PO45678.exe, 00000000.00000002.258342945.0000000002491000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
                      Source: PO45678.exe, 00000000.00000002.258342945.0000000002491000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/
                      Source: PO45678.exe, 00000000.00000002.262870817.0000000003D1A000.00000004.00000001.sdmp, InstallUtil.exe, 00000004.00000002.490156222.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: PO45678.exe, 00000000.00000002.257035836.0000000000890000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 4.2.InstallUtil.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b0140664Du002d00B4u002d412Eu002d8482u002dE3247254E749u007d/AC89D138u002dBE2Eu002d48F8u002d99B9u002dA10B61AE75F1.csLarge array initialization: .cctor: array initializer size 11952
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0451201C CreateProcessAsUserW,
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04515C48
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04518072
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04512478
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04514189
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04512E6E
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0451AA81
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0451637A
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_045174F0
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_045174E0
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04518CB8
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04518CA7
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04517958
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04517968
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04519938
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0451B6B0
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_04511319
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06222E20
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06223680
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06220E98
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06224F60
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06229FB0
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622E788
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622EC30
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622B810
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_062240D2
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06220950
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06226A32
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06222E11
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622A261
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622A270
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06224E78
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06225E78
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06226A40
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06224EBD
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06225E88
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06221E90
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06227308
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06227318
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06227768
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06223B80
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622C3C0
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622B008
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_062270E0
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_062270D0
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06227580
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622F188
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06227590
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4CF70
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B46F60
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B482B8
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4B560
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B44860
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B44850
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4EEB8
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B44E10
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B44E00
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4CF60
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B46F50
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B482A8
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B472FA
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B472E5
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4822E
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4739E
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B47389
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B49370
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B49360
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B47428
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B47413
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4B550
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B496F6
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00C820B0
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF21D0
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DFE1C0
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF8120
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF6650
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF8200
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF3708
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF78B8
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameInstallUtil.exeT vs PO45678.exe
                      Source: PO45678.exe, 00000000.00000002.262753091.0000000003498000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs PO45678.exe
                      Source: PO45678.exe, 00000000.00000002.263166955.0000000004520000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPe6.dll" vs PO45678.exe
                      Source: PO45678.exe, 00000000.00000002.257035836.0000000000890000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO45678.exe
                      Source: PO45678.exe, 00000000.00000002.264500771.0000000005ED0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PO45678.exe
                      Source: PO45678.exe, 00000000.00000002.262927323.0000000003D7D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameIobwYHdtWDofwYxNGTKfRbZXkCNIJuWdMua.exe4 vs PO45678.exe
                      Source: PO45678.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: 4.2.InstallUtil.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.2.InstallUtil.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/0
                      Source: C:\Users\user\Desktop\PO45678.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO45678.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\PO45678.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
                      Source: PO45678.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\PO45678.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO45678.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\PO45678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO45678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO45678.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PO45678.exeReversingLabs: Detection: 21%
                      Source: PO45678.exeString found in binary or memory: icons8-add-24
                      Source: PO45678.exeString found in binary or memory: icons8-add-32
                      Source: PO45678.exeString found in binary or memory: icons8-add-48
                      Source: PO45678.exeString found in binary or memory: icons8-add-administrator-50
                      Source: PO45678.exeString found in binary or memory: icons8-add-24
                      Source: PO45678.exeString found in binary or memory: icons8-add-32[
                      Source: PO45678.exeString found in binary or memory: icons8-add-48
                      Source: PO45678.exeString found in binary or memory: 6icons8-add-administrator-50
                      Source: unknownProcess created: C:\Users\user\Desktop\PO45678.exe 'C:\Users\user\Desktop\PO45678.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                      Source: C:\Users\user\Desktop\PO45678.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\PO45678.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: PO45678.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PO45678.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000004.00000002.490827482.0000000000C82000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
                      Source: Binary string: InstallUtil.pdbJ source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmp
                      Source: Binary string: InstallUtil.pdb source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmp, InstallUtil.exe, InstallUtil.exe.0.dr
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A581C push ecx; retf
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A5824 push esi; retf
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A2638 push ds; retf
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A4C9F push edi; iretd
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A52AD push esp; ret
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A56FC push cs; retf
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A32FD pushad ; iretd
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A4F52 push esp; ret
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A5757 push cs; retf
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A579F push ds; retf
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A37C9 push edx; ret
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A57C7 push ecx; retf
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A2FD7 push 76AD6F7Eh; iretd
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_000A37EA push edi; ret
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_06227A74 push ecx; iretd
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_062217D2 push ecx; ret
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_0622296F push es; iretd
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_062229AA push es; iretd
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_062229B5 push es; iretd
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B49EA3 push edi; ret
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B451FF push eax; retn 0023h
                      Source: C:\Users\user\Desktop\PO45678.exeCode function: 0_2_08B4D342 push ebx; ret
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DFE918 pushfd ; iretd
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DFC902 push 8BFFFFFFh; retf
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DFD3BF pushad ; retf
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF4FB5 push edx; retf 005Bh
                      Source: PO45678.exe, Cm15/Ft4q.csHigh entropy of concatenated method names: '.ctor', 't6ZG', 'Nb56', 'w0X2', 'm6Z1', 'Yo3j', 'm2G0', 'My05', 'Jb5e', 'Ya42'
                      Source: PO45678.exe, Jy4/Po0.csHigh entropy of concatenated method names: '.ctor', 'Cs1', 'Da1', 'Ak0', 'p9H', 'g3B', 'Dq9', 't7R', 'To3', 'Sx1'
                      Source: PO45678.exe, Dj51/Jy35.csHigh entropy of concatenated method names: '.ctor', 'w9HT', 'n0L', 'k2S', 'g6G', 'a5X', 'p1Q', 'Se5', 'd5M', 'Qq2'
                      Source: 0.0.PO45678.exe.a0000.0.unpack, Cm15/Ft4q.csHigh entropy of concatenated method names: '.ctor', 't6ZG', 'Nb56', 'w0X2', 'm6Z1', 'Yo3j', 'm2G0', 'My05', 'Jb5e', 'Ya42'
                      Source: 0.0.PO45678.exe.a0000.0.unpack, Jy4/Po0.csHigh entropy of concatenated method names: '.ctor', 'Cs1', 'Da1', 'Ak0', 'p9H', 'g3B', 'Dq9', 't7R', 'To3', 'Sx1'
                      Source: 0.0.PO45678.exe.a0000.0.unpack, Dj51/Jy35.csHigh entropy of concatenated method names: '.ctor', 'w9HT', 'n0L', 'k2S', 'g6G', 'a5X', 'p1Q', 'Se5', 'd5M', 'Qq2'
                      Source: C:\Users\user\Desktop\PO45678.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\Desktop\PO45678.exeFile opened: C:\Users\user\Desktop\PO45678.exe\:Zone.Identifier read attributes | delete
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\PO45678.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\PO45678.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 4264
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 5459
                      Source: C:\Users\user\Desktop\PO45678.exe TID: 6468Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\PO45678.exe TID: 6472Thread sleep count: 228 > 30
                      Source: C:\Users\user\Desktop\PO45678.exe TID: 6472Thread sleep count: 104 > 30
                      Source: C:\Users\user\Desktop\PO45678.exe TID: 6452Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\Desktop\PO45678.exe TID: 6416Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 964Thread sleep time: -11990383647911201s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 4496Thread sleep count: 4264 > 30
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 4496Thread sleep count: 5459 > 30
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 964Thread sleep count: 36 > 30
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: VMware
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware vmci bus device!vmware virtual s scsi disk device
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware svga
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vboxservice
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: Microsoft Hyper-Vmicrosoft
                      Source: InstallUtil.exe, 00000004.00000002.499349173.0000000006150000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware usb pointing device
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmusrvc
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware pointing device
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware sata
                      Source: InstallUtil.exe, 00000004.00000002.499962081.0000000006BB0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmsrvc
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmtools
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: Microsoft Hyper-V
                      Source: InstallUtil.exe, 00000004.00000002.499349173.0000000006150000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware virtual s scsi disk device
                      Source: InstallUtil.exe, 00000004.00000002.499349173.0000000006150000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: PO45678.exe, 00000000.00000002.258605320.0000000002543000.00000004.00000001.sdmpBinary or memory string: vmware vmci bus device
                      Source: InstallUtil.exe, 00000004.00000002.499349173.0000000006150000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\PO45678.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 4_2_00DF3708 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\PO45678.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\PO45678.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\PO45678.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 protect: page execute and read and write
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\PO45678.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 value starts with: 4D5A
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\PO45678.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000
                      Source: C:\Users\user\Desktop\PO45678.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 402000
                      Source: C:\Users\user\Desktop\PO45678.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 438000
                      Source: C:\Users\user\Desktop\PO45678.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 43A000
                      Source: C:\Users\user\Desktop\PO45678.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: F6F008
                      Source: C:\Users\user\Desktop\PO45678.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                      Source: InstallUtil.exe, 00000004.00000002.493947731.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: InstallUtil.exe, 00000004.00000002.493947731.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: InstallUtil.exe, 00000004.00000002.493947731.0000000001A60000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                      Source: InstallUtil.exe, 00000004.00000002.493947731.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: InstallUtil.exe, 00000004.00000002.493947731.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PO45678.exeQueries volume information: C:\Users\user\Desktop\PO45678.exe VolumeInformation
                      Source: C:\Users\user\Desktop\PO45678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO45678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO45678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO45678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO45678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO45678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO45678.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.262870817.0000000003D1A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.490156222.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.263060829.0000000003E8B000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.262927323.0000000003D7D000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6708, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO45678.exe PID: 6392, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO45678.exe.3db3caa.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3de9b8a.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e8b7da.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e1fa5a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3ec1698.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3db3caa.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3ec1698.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3de9b8a.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e8b7da.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e1fa5a.4.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6708, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.262870817.0000000003D1A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.490156222.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.263060829.0000000003E8B000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.262927323.0000000003D7D000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6708, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO45678.exe PID: 6392, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO45678.exe.3db3caa.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3de9b8a.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e8b7da.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e1fa5a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3ec1698.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3db3caa.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3ec1698.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3de9b8a.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e8b7da.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO45678.exe.3e1fa5a.4.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1Windows Management Instrumentation211Valid Accounts1Valid Accounts1Disable or Modify Tools1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information1Input Capture1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Process Injection312Obfuscated Files or Information2Credentials in Registry1Security Software Discovery111SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput Capture1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonValid Accounts1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion13DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PO45678.exe21%ReversingLabsWin32.Trojan.Wacatac
                      PO45678.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://oAv8kfbDtujMAmvvMu95.org0%Avira URL Cloudsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://crl.comodoca.c0%Avira URL Cloudsafe
                      http://ns.adobe.c/g)0%Avira URL Cloudsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
                      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
                      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
                      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
                      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
                      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
                      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
                      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
                      https://api.ipify.org%H0%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://ns.adobe.c/g%%0%Avira URL Cloudsafe
                      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
                      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
                      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
                      http://ns.adobe.c/g0%URL Reputationsafe
                      http://ns.adobe.c/g0%URL Reputationsafe
                      http://ns.adobe.c/g0%URL Reputationsafe
                      http://SEqkTC.com0%Avira URL Cloudsafe
                      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
                      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
                      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
                      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
                      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
                      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
                      https://pki.goog/repository/00%URL Reputationsafe
                      https://pki.goog/repository/00%URL Reputationsafe
                      https://pki.goog/repository/00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.privateemail.com
                      198.54.122.60
                      truefalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://oAv8kfbDtujMAmvvMu95.orgInstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmp, InstallUtil.exe, 00000004.00000002.495545429.0000000003270000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSInstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://sectigo.com/CPS0InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://crl.comodoca.cInstallUtil.exe, 00000004.00000002.499962081.0000000006BB0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ns.adobe.c/g)PO45678.exe, 00000000.00000003.236907309.0000000008EF3000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.sectigo.com0InstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haInstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ocsp.pki.goog/gts1o1core0PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://crl.pki.goog/GTS1O1core.crl0PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org%HInstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://api.ipify.org%GETMozilla/5.0InstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://ns.adobe.c/g%%PO45678.exe, 00000000.00000003.256003842.0000000008EFB000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://pki.goog/gsr2/GTS1O1.crt0PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ns.adobe.c/gPO45678.exe, 00000000.00000003.244413137.0000000008EF3000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://SEqkTC.comInstallUtil.exe, 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.pki.goog/gsr2/gsr2.crl0?PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ocsp.pki.goog/gsr202PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://pki.goog/repository/0PO45678.exe, 00000000.00000002.257428591.0000000000902000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://mail.privateemail.comInstallUtil.exe, 00000004.00000002.495371195.0000000003245000.00000004.00000001.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO45678.exe, 00000000.00000002.258342945.0000000002491000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPO45678.exe, 00000000.00000002.262870817.0000000003D1A000.00000004.00000001.sdmp, InstallUtil.exe, 00000004.00000002.490156222.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://schema.org/WebPagePO45678.exe, 00000000.00000002.258461700.00000000024C2000.00000004.00000001.sdmp, PO45678.exe, 00000000.00000002.258539906.00000000024D8000.00000004.00000001.sdmpfalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:358415
                              Start date:25.02.2021
                              Start time:15:36:25
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 8m 6s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:PO45678.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:25
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/2@1/0
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 6% (good quality ratio 3.5%)
                              • Quality average: 27.6%
                              • Quality standard deviation: 29.1%
                              HCA Information:
                              • Successful, ratio: 91%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 93.184.220.29, 51.11.168.160, 13.64.90.137, 13.88.21.125, 168.61.161.212, 23.211.6.115, 216.58.206.68, 40.88.32.150, 23.218.208.56, 51.104.144.132, 51.103.5.186, 2.20.142.209, 2.20.142.210, 92.122.213.194, 92.122.213.247, 20.54.26.129, 84.53.167.113
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, cs9.wac.phicdn.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, e15275.g.akamaiedge.net, arc.msn.com, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, ocsp.digicert.com, wildcard.weather.microsoft.com.edgekey.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, www.google.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, tile-service.weather.microsoft.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              15:37:41API Interceptor1x Sleep call for process: PO45678.exe modified
                              15:37:55API Interceptor611x Sleep call for process: InstallUtil.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              mail.privateemail.comOFFER.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              SecuriteInfo.com.W32.MSIL_Kryptik.COP.genEldorado.31763.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              SecuriteInfo.com.TR.AD.AgentTesla.yuenz.18281.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              DHL_DELI.EXEGet hashmaliciousBrowse
                              • 198.54.122.60
                              4MyakrzyM2.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              yJMBdPH5Uj.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              3KPjI4YLvT.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              qUvEiyPz1P.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              Z5clpoFy0o.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              fNhla8Q8Ll.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              Document_25102020.docGet hashmaliciousBrowse
                              • 198.54.122.60
                              SecuriteInfo.com.Win32.32289.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              SecuriteInfo.com.Win32.18332.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              s3HAoqkLuR.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              Request For Quotation RFQ 53253quote Pricelist of Order.docGet hashmaliciousBrowse
                              • 198.54.122.60
                              Order Specification.docGet hashmaliciousBrowse
                              • 198.54.122.60
                              ORDER.docGet hashmaliciousBrowse
                              • 198.54.122.60
                              SecuriteInfo.com.FileRepMalware.4966.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              dwXuNeEeql.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              DG6PQDuCfL.exeGet hashmaliciousBrowse
                              • 198.54.122.60

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              C:\Users\user\AppData\Local\Temp\InstallUtil.exeHblVSJaQa1.exeGet hashmaliciousBrowse
                                DEBIT NOTE.exeGet hashmaliciousBrowse
                                  MT SC GUANGZHOU.exeGet hashmaliciousBrowse
                                    MT WOOJIN CHEMS V.2103.exeGet hashmaliciousBrowse
                                      New Order 632487 PDF.exeGet hashmaliciousBrowse
                                        HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                          HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                            REQUEST FOR OFFER.exeGet hashmaliciousBrowse
                                              New Order.exeGet hashmaliciousBrowse
                                                v2.exeGet hashmaliciousBrowse
                                                  MPO-003234.exeGet hashmaliciousBrowse
                                                    Payment copy.exeGet hashmaliciousBrowse
                                                      New Order.exeGet hashmaliciousBrowse
                                                        YKRAB010B_KHE_Preminary Packing List.xlsx.exeGet hashmaliciousBrowse
                                                          RTM DIAS - CTM.exeGet hashmaliciousBrowse
                                                            SecuriteInfo.com.Artemis249E62CF9BAE.exeGet hashmaliciousBrowse
                                                              SecuriteInfo.com.Trojan.Packed2.42841.18110.exeGet hashmaliciousBrowse
                                                                DETALLE DE TRANSFERENCIA BANCO AGRARO DE COLOMBIA.exeGet hashmaliciousBrowse
                                                                  index_2021-02-18-20_41.exeGet hashmaliciousBrowse
                                                                    XXXXXXXXXXXXXX.exeGet hashmaliciousBrowse

                                                                      Created / dropped Files

                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO45678.exe.log
                                                                      Process:C:\Users\user\Desktop\PO45678.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1214
                                                                      Entropy (8bit):5.358666369753595
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4K5AE4Kzr7K84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoM:MIHK5HKXE1qHbHK5AHKzvKviYHKhQnoH
                                                                      MD5:1F3BB210B09FE31192C6A822966919E9
                                                                      SHA1:A8715FFF2F9D1BE024F462CF702D1E7F71AA4B4F
                                                                      SHA-256:C6B3057777EE46AC3544F9FA829E918CD7EF70E490424616650DDA01BF214043
                                                                      SHA-512:26897678275FEFDFD96FCB7F7FAFFD5FB0BC0FEB35C89BEB4BA15D074155A06236E8681A2CA9C9DCFDDF2462644CD3603C3592AB310BA84E3D93C8BF2CE28DD5
                                                                      Malicious:true
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Co
                                                                      C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                      Process:C:\Users\user\Desktop\PO45678.exe
                                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):41064
                                                                      Entropy (8bit):6.164873449128079
                                                                      Encrypted:false
                                                                      SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                                      MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                                      SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                                      SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                                      SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Joe Sandbox View:
                                                                      • Filename: HblVSJaQa1.exe, Detection: malicious, Browse
                                                                      • Filename: DEBIT NOTE.exe, Detection: malicious, Browse
                                                                      • Filename: MT SC GUANGZHOU.exe, Detection: malicious, Browse
                                                                      • Filename: MT WOOJIN CHEMS V.2103.exe, Detection: malicious, Browse
                                                                      • Filename: New Order 632487 PDF.exe, Detection: malicious, Browse
                                                                      • Filename: HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exe, Detection: malicious, Browse
                                                                      • Filename: HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exe, Detection: malicious, Browse
                                                                      • Filename: REQUEST FOR OFFER.exe, Detection: malicious, Browse
                                                                      • Filename: New Order.exe, Detection: malicious, Browse
                                                                      • Filename: v2.exe, Detection: malicious, Browse
                                                                      • Filename: MPO-003234.exe, Detection: malicious, Browse
                                                                      • Filename: Payment copy.exe, Detection: malicious, Browse
                                                                      • Filename: New Order.exe, Detection: malicious, Browse
                                                                      • Filename: YKRAB010B_KHE_Preminary Packing List.xlsx.exe, Detection: malicious, Browse
                                                                      • Filename: RTM DIAS - CTM.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Artemis249E62CF9BAE.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Trojan.Packed2.42841.18110.exe, Detection: malicious, Browse
                                                                      • Filename: DETALLE DE TRANSFERENCIA BANCO AGRARO DE COLOMBIA.exe, Detection: malicious, Browse
                                                                      • Filename: index_2021-02-18-20_41.exe, Detection: malicious, Browse
                                                                      • Filename: XXXXXXXXXXXXXX.exe, Detection: malicious, Browse
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):6.661457990127764
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      File name:PO45678.exe
                                                                      File size:866304
                                                                      MD5:0f3ca465173914c361362a754a6bf65e
                                                                      SHA1:46dded33d12784afe77619a20ee65d1939f881b0
                                                                      SHA256:400b1bf4c7139f7df22748d627aeb7789dd409ae463a0f8fb7d6fa243065d140
                                                                      SHA512:fe35ff76ac0e451c3bd6c643d6714c56974a2faaef2c6ff2685764e6b363b88d004a819d900e7753cc46097a3109c361b2ecfe6882183f2b649bc284603b4fd5
                                                                      SSDEEP:12288:2+1YHCIVKyxz33JQ3Krcrlhiz6021uysgKtMuL+Y8VSpW:2+SCJKrcBgp2IyZTe
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....lRI.................,..........NK... ...`....@.. ....................................`................................

                                                                      File Icon

                                                                      Icon Hash:00828e8e8686b000

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x4d4b4e
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                      Time Stamp:0x49526CC3 [Wed Dec 24 17:09:23 2008 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd4b000x4b.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd60000x60e.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd80000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000xd2b540xd2c00False0.641939826142data6.67037029793IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xd60000x60e0x800False0.345703125data3.62726211385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xd80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0xd60a00x384data
                                                                      RT_MANIFEST0xd64240x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                      Imports

                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain

                                                                      Version Infos

                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightCopyright 2011 GAD?49GE:FHAI578@JB>@<
                                                                      Assembly Version1.0.0.0
                                                                      InternalNamePO45678.exe
                                                                      FileVersion7.10.14.17
                                                                      CompanyNameGAD?49GE:FHAI578@JB>@<
                                                                      Comments2II?84J=7>977?I
                                                                      ProductName>J<J::@8<I>?JB8
                                                                      ProductVersion7.10.14.17
                                                                      FileDescription>J<J::@8<I>?JB8
                                                                      OriginalFilenamePO45678.exe

                                                                      Network Behavior

                                                                      Network Port Distribution

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Feb 25, 2021 15:37:06.761845112 CET5430253192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:06.810607910 CET53543028.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:06.931421041 CET5378453192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:06.980137110 CET53537848.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:07.101974964 CET6530753192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:07.138988972 CET6434453192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:07.153562069 CET53653078.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:07.187673092 CET53643448.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:07.596024990 CET6206053192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:07.644855976 CET53620608.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:08.848843098 CET6180553192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:08.897536993 CET53618058.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:10.000252962 CET5479553192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:10.049242020 CET53547958.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:11.324085951 CET4955753192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:11.382345915 CET53495578.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:11.539911032 CET6173353192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:11.588571072 CET53617338.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:13.337769032 CET6544753192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:13.386534929 CET53654478.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:16.368733883 CET5244153192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:16.431003094 CET53524418.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:16.859111071 CET6217653192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:16.916135073 CET53621768.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:16.926395893 CET5959653192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:16.975133896 CET53595968.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:20.128809929 CET6529653192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:20.177870035 CET53652968.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:21.102575064 CET6318353192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:21.154478073 CET53631838.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:22.075711966 CET6015153192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:22.132915020 CET53601518.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:23.222260952 CET5696953192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:23.270998001 CET53569698.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:24.172314882 CET5516153192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:24.229481936 CET53551618.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:25.153867006 CET5475753192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:25.202584028 CET53547578.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:33.327308893 CET4999253192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:33.385937929 CET53499928.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:37:50.545897007 CET6007553192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:37:50.594573975 CET53600758.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:01.761070013 CET5501653192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:01.809783936 CET53550168.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:02.337074995 CET6434553192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:02.407722950 CET53643458.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:09.504225016 CET5712853192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:09.562475920 CET53571288.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:13.899379015 CET5479153192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:13.959279060 CET53547918.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:21.249206066 CET5046353192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:21.308343887 CET53504638.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:46.156953096 CET5039453192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:46.215894938 CET53503948.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:47.689454079 CET5853053192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:47.738306046 CET53585308.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:38:51.317082882 CET5381353192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:38:51.374279022 CET53538138.8.8.8192.168.2.5
                                                                      Feb 25, 2021 15:39:18.096446991 CET6373253192.168.2.58.8.8.8
                                                                      Feb 25, 2021 15:39:18.156415939 CET53637328.8.8.8192.168.2.5

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Feb 25, 2021 15:39:18.096446991 CET192.168.2.58.8.8.80x9e87Standard query (0)mail.privateemail.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Feb 25, 2021 15:39:18.156415939 CET8.8.8.8192.168.2.50x9e87No error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:15:37:27
                                                                      Start date:25/02/2021
                                                                      Path:C:\Users\user\Desktop\PO45678.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\PO45678.exe'
                                                                      Imagebase:0xa0000
                                                                      File size:866304 bytes
                                                                      MD5 hash:0F3CA465173914C361362A754A6BF65E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.262870817.0000000003D1A000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.263060829.0000000003E8B000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.262927323.0000000003D7D000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:15:37:38
                                                                      Start date:25/02/2021
                                                                      Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                      Imagebase:0xc80000
                                                                      File size:41064 bytes
                                                                      MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.494036078.0000000002F71000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.490156222.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 0%, Metadefender, Browse
                                                                      • Detection: 0%, ReversingLabs
                                                                      Reputation:moderate

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >