Loading ...

Play interactive tourEdit tour

Analysis Report AMPUTERE.exe

Overview

General Information

Sample Name:AMPUTERE.exe
Analysis ID:379730
MD5:f2fa3c87de32858f1244fb352873f399
SHA1:3d6f6d635639c689a8e4709ccb379500b4e76096
SHA256:2beda3caff1f808814294dca346cbe62ad229272d54696fe75e99388a73ff3cc
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • AMPUTERE.exe (PID: 6608 cmdline: 'C:\Users\user\Desktop\AMPUTERE.exe' MD5: F2FA3C87DE32858F1244FB352873F399)
    • RegAsm.exe (PID: 6044 cmdline: 'C:\Users\user\Desktop\AMPUTERE.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 1212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000013.00000002.859923887.0000000001102000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
        Process Memory Space: RegAsm.exe PID: 6044JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 6044JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: AMPUTERE.exeAvira: detected
            Multi AV Scanner detection for submitted fileShow sources
            Source: AMPUTERE.exeVirustotal: Detection: 44%Perma Link
            Source: AMPUTERE.exeReversingLabs: Detection: 68%
            Machine Learning detection for sampleShow sources
            Source: AMPUTERE.exeJoe Sandbox ML: detected
            Source: AMPUTERE.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: unknownHTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.6:49747 version: TLS 1.2
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS traffic detected: queries for: doc-14-a0-docs.googleusercontent.com
            Source: RegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: http://CFlLIU.com
            Source: RegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exeString found in binary or memory: https://drive.google.com/uc?export=download&id=1YqpUxJBnjokc5FJGT-8XzuYbR97RtVG2
            Source: RegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
            Source: unknownHTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.6:49747 version: TLS 1.2
            Source: AMPUTERE.exe, 00000000.00000002.811048059.00000000005EA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess Stats: CPU usage > 98%
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107349 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01106E63 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_0110752F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_0110755B NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_0110759F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107583 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011075BB NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011075E7 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107417 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107437 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107457 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107477 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011074A0 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011074DF NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_0110770C NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107747 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_0110777F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107363 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107384 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011073B3 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011073CB NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011073EB NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107603 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01106E22 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01106E47 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107663 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011076AB NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011076CB NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_1DC8B0BA NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_1DC8B089 NtQuerySystemInformation,
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409418
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A862
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A078
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A478
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040943F
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409886
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004094B0
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A101
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A50A
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409D0C
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409918
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409DED
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409588
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A193
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A595
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004099A6
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004095BE
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409649
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A628
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409A2A
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409A2C
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409E30
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A2C0
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409EC4
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004096D5
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A6FC
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A6B3
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409ABB
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A746
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409B50
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040A356
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409F5F
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409762
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409BE2
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409FE9
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004097F4
            Source: AMPUTERE.exe, 00000000.00000002.811248602.0000000002200000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs AMPUTERE.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
            Source: AMPUTERE.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.troj.evad.winEXE@4/0@1/1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_1DC8AF3E AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_1DC8AF07 AdjustTokenPrivileges,
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1212:120:WilError_01
            Source: C:\Users\user\Desktop\AMPUTERE.exeFile created: C:\Users\user\AppData\Local\Temp\~DF371BB4A539764BA1.TMPJump to behavior
            Source: AMPUTERE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\AMPUTERE.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\AMPUTERE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: AMPUTERE.exeVirustotal: Detection: 44%
            Source: AMPUTERE.exeReversingLabs: Detection: 68%
            Source: unknownProcess created: C:\Users\user\Desktop\AMPUTERE.exe 'C:\Users\user\Desktop\AMPUTERE.exe'
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\AMPUTERE.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\AMPUTERE.exe'
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000013.00000002.859923887.0000000001102000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6044, type: MEMORY
            Source: AMPUTERE.exeStatic PE information: real checksum: 0x255bc should be: 0x22e67
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040306C push esi; iretd
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040307A push esi; ret
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004034DD push ebp; ret
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004058EE push esi; ret
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040888A push esi; ret
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_004071F6 push esi; retf
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_0040723D push esi; ret
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00404BEA push esi; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01104B84 push dword ptr [ebp+77h]; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01107384 push cs; retn EB1Ah
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01103317
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011032A2
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 00000000005261EC second address: 00000000005261EC instructions:
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 0000000000526246 second address: 0000000000526246 instructions:
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 0000000000526315 second address: 0000000000526315 instructions:
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 00000000005233AC second address: 00000000005233AC instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F99848EE8F8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e test dh, ch 0x00000020 add edi, edx 0x00000022 test ecx, ebx 0x00000024 dec ecx 0x00000025 jmp 00007F99848EE90Ah 0x00000027 test bl, bl 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007F99848EE8A5h 0x0000002e push ecx 0x0000002f jmp 00007F99848EE90Ah 0x00000031 cmp bh, ah 0x00000033 cmp ah, bh 0x00000035 call 00007F99848EE93Fh 0x0000003a call 00007F99848EE908h 0x0000003f lfence 0x00000042 mov edx, dword ptr [7FFE0014h] 0x00000048 lfence 0x0000004b ret 0x0000004c mov esi, edx 0x0000004e pushad 0x0000004f rdtsc
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 0000000000526BD4 second address: 0000000000526BD4 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp byte ptr [ebx], FFFFFFB8h 0x0000000d jne 00007F99848EE922h 0x0000000f cmp ecx, 00002000h 0x00000015 jne 00007F99848EE7C6h 0x0000001b inc ecx 0x0000001c inc ebx 0x0000001d test cl, dl 0x0000001f cmp dword ptr [ebx], 9090C350h 0x00000025 jne 00007F99848EE926h 0x00000027 cmp edx, 257E6A7Fh 0x0000002d cmp edx, dword ptr [ebx] 0x0000002f jne 00007F99848EE916h 0x00000031 test dh, ch 0x00000033 cmp byte ptr [ebx], FFFFFFE8h 0x00000036 jne 00007F99848EE95Bh 0x00000038 cmp edi, 1B7EF1A7h 0x0000003e pushad 0x0000003f rdtsc
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 00000000005209F7 second address: 00000000005209F7 instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001101F83 second address: 0000000001101F83 instructions:
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\AMPUTERE.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\AMPUTERE.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 00000000005261EC second address: 00000000005261EC instructions:
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 0000000000526246 second address: 0000000000526246 instructions:
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 0000000000526315 second address: 0000000000526315 instructions:
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 00000000005233AC second address: 00000000005233AC instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F99848EE8F8h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e test dh, ch 0x00000020 add edi, edx 0x00000022 test ecx, ebx 0x00000024 dec ecx 0x00000025 jmp 00007F99848EE90Ah 0x00000027 test bl, bl 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007F99848EE8A5h 0x0000002e push ecx 0x0000002f jmp 00007F99848EE90Ah 0x00000031 cmp bh, ah 0x00000033 cmp ah, bh 0x00000035 call 00007F99848EE93Fh 0x0000003a call 00007F99848EE908h 0x0000003f lfence 0x00000042 mov edx, dword ptr [7FFE0014h] 0x00000048 lfence 0x0000004b ret 0x0000004c mov esi, edx 0x0000004e pushad 0x0000004f rdtsc
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 00000000005235B0 second address: 00000000005235B0 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F99845B8528h 0x0000001d popad 0x0000001e jmp 00007F99845B565Ah 0x00000020 test ch, dh 0x00000022 call 00007F99845B568Bh 0x00000027 lfence 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 0000000000526BD4 second address: 0000000000526BD4 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp byte ptr [ebx], FFFFFFB8h 0x0000000d jne 00007F99848EE922h 0x0000000f cmp ecx, 00002000h 0x00000015 jne 00007F99848EE7C6h 0x0000001b inc ecx 0x0000001c inc ebx 0x0000001d test cl, dl 0x0000001f cmp dword ptr [ebx], 9090C350h 0x00000025 jne 00007F99848EE926h 0x00000027 cmp edx, 257E6A7Fh 0x0000002d cmp edx, dword ptr [ebx] 0x0000002f jne 00007F99848EE916h 0x00000031 test dh, ch 0x00000033 cmp byte ptr [ebx], FFFFFFE8h 0x00000036 jne 00007F99848EE95Bh 0x00000038 cmp edi, 1B7EF1A7h 0x0000003e pushad 0x0000003f rdtsc
            Source: C:\Users\user\Desktop\AMPUTERE.exeRDTSC instruction interceptor: First address: 00000000005209F7 second address: 00000000005209F7 instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 00000000011035B0 second address: 00000000011035B0 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F99848F17D8h 0x0000001d popad 0x0000001e jmp 00007F99848EE90Ah 0x00000020 test ch, dh 0x00000022 call 00007F99848EE93Bh 0x00000027 lfence 0x0000002a rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001101F6C second address: 0000000001101F83 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 call 00007F99845B5BC9h 0x00000008 cmp dword ptr [edi+00000818h], 00000000h 0x0000000f je 00007F99845B5708h 0x00000015 test ah, ah 0x00000017 ret 0x00000018 cmp edx, A37443ABh 0x0000001e test edx, ecx 0x00000020 mov eax, dword ptr fs:[00000030h] 0x00000026 pushad 0x00000027 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000001101F83 second address: 0000000001101F83 instructions:
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409418 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 772Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 772Thread sleep time: -3210000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 772Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: RegAsm.exe, 00000013.00000002.865466102.00000000203F0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: RegAsm.exe, 00000013.00000002.865466102.00000000203F0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: RegAsm.exe, 00000013.00000002.865466102.00000000203F0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: RegAsm.exe, 00000013.00000002.865466102.00000000203F0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\AMPUTERE.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\AMPUTERE.exeCode function: 0_2_00409418 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01104417 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_0110690F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01106977 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011031DF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01106089 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01105733 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_01103200 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\AMPUTERE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: 1100000
            Source: C:\Users\user\Desktop\AMPUTERE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\AMPUTERE.exe'
            Source: RegAsm.exe, 00000013.00000002.860438642.0000000001980000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000013.00000002.860438642.0000000001980000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000013.00000002.860438642.0000000001980000.00000002.00000001.sdmpBinary or memory string: &Program Manager
            Source: RegAsm.exe, 00000013.00000002.860438642.0000000001980000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 19_2_011069B3 cpuid
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6044, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6044, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6044, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Access Token Manipulation1Disable or Modify Tools1Input Capture1Security Software Discovery731Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Virtualization/Sandbox Evasion341LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Access Token Manipulation1Security Account ManagerVirtualization/Sandbox Evasion341SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsSystem Information Discovery423SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            AMPUTERE.exe45%VirustotalBrowse
            AMPUTERE.exe69%ReversingLabsWin32.Trojan.GenericML
            AMPUTERE.exe100%AviraHEUR/AGEN.1138570
            AMPUTERE.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.2.AMPUTERE.exe.400000.0.unpack100%AviraHEUR/AGEN.1138570Download File
            0.0.AMPUTERE.exe.400000.0.unpack100%AviraHEUR/AGEN.1138570Download File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://CFlLIU.com0%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            googlehosted.l.googleusercontent.com
            216.58.215.225
            truefalse
              high
              doc-14-a0-docs.googleusercontent.com
              unknown
              unknownfalse
                high

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://CFlLIU.comRegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://DynDns.comDynDNSRegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                216.58.215.225
                googlehosted.l.googleusercontent.comUnited States
                15169GOOGLEUSfalse

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:379730
                Start date:01.04.2021
                Start time:07:40:53
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 1s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:AMPUTERE.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:22
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@4/0@1/1
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 95.9% (good quality ratio 37%)
                • Quality average: 21.8%
                • Quality standard deviation: 30.5%
                HCA Information:
                • Successful, ratio: 87%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                • Override analysis time to 240s for sample files taking high CPU consumption
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                • TCP Packets have been reduced to 100
                • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.43.193.48, 168.61.161.212, 13.107.4.50, 104.43.139.144, 40.88.32.150, 20.82.210.154, 2.20.142.210, 2.20.142.209, 52.155.217.156, 20.54.26.129, 92.122.213.194, 92.122.213.247, 23.218.208.56, 216.58.215.238
                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, 2-01-3cf7-0009.cdx.cedexis.net, b1ns.c-0001.c-msedge.net, wu-fg-shim.trafficmanager.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, b1ns.au-msedge.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, c-0001.c-msedge.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, download.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                07:45:34API Interceptor158x Sleep call for process: RegAsm.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                37f463bf4616ecd445d4a1937da06e19martin.connor SWIFT Copy 2021.htmGet hashmaliciousBrowse
                • 216.58.215.225
                xXeJaeHDWB.exeGet hashmaliciousBrowse
                • 216.58.215.225
                Purchase_Order 3109.xlsGet hashmaliciousBrowse
                • 216.58.215.225
                Invoice_150.xlsmGet hashmaliciousBrowse
                • 216.58.215.225
                FileZilla_3.53.1_win64_sponsored-setup.exeGet hashmaliciousBrowse
                • 216.58.215.225
                #Ufffd.HTMLGet hashmaliciousBrowse
                • 216.58.215.225
                FileZilla_3.53.1_win64_sponsored-setup.exeGet hashmaliciousBrowse
                • 216.58.215.225
                SecuriteInfo.com.Mal.GandCrypt-A.4160.exeGet hashmaliciousBrowse
                • 216.58.215.225
                1Nqs1iTfMz.exeGet hashmaliciousBrowse
                • 216.58.215.225
                yPkfbflyoh.exeGet hashmaliciousBrowse
                • 216.58.215.225
                SOC_0#7198, INV#512 Via GoogleDocs gracechung.htmlGet hashmaliciousBrowse
                • 216.58.215.225
                lv.exeGet hashmaliciousBrowse
                • 216.58.215.225
                8637.xlsxGet hashmaliciousBrowse
                • 216.58.215.225
                YtR0OI1H6G.exeGet hashmaliciousBrowse
                • 216.58.215.225
                ABS Browser.exeGet hashmaliciousBrowse
                • 216.58.215.225
                reciept-id.htmGet hashmaliciousBrowse
                • 216.58.215.225
                Closure TP-Stamp.htmGet hashmaliciousBrowse
                • 216.58.215.225
                Audio playback (7656) for joew Camrosa.htmGet hashmaliciousBrowse
                • 216.58.215.225
                CopyDocs-BUSINESS-CONFIRMATION_NO-MGFT560_0w9wMGT500383RRTF.exeGet hashmaliciousBrowse
                • 216.58.215.225
                JYDy1dAHdW.exeGet hashmaliciousBrowse
                • 216.58.215.225

                Dropped Files

                No context

                Created / dropped Files

                No created / dropped files found

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):5.402488868367982
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.15%
                • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:AMPUTERE.exe
                File size:90112
                MD5:f2fa3c87de32858f1244fb352873f399
                SHA1:3d6f6d635639c689a8e4709ccb379500b4e76096
                SHA256:2beda3caff1f808814294dca346cbe62ad229272d54696fe75e99388a73ff3cc
                SHA512:46058516a19a7db0833fd84a17ab9f8a80b992e6ac76727abe879dd1bf2e5a04636b7436746b5a472dd67c1efa42a007a88779a2f1f6ec12d431a6be8a13a605
                SSDEEP:768:xKOhTQs/sICfEBiQPIHYqH3qkfNS1Z5EK8GEHPZNrLzrKBvY:1hkGxCfEBiiIjHBG8tHC
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L......T................. ...0...............0....@................

                File Icon

                Icon Hash:f1f8f6f0f0e4f831

                Static PE Info

                General

                Entrypoint:0x4016fc
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:
                Time Stamp:0x540DA20E [Mon Sep 8 12:33:18 2014 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:c78f78af0a4b82efe93f926bf0040578

                Entrypoint Preview

                Instruction
                push 0040CE4Ch
                call 00007F9984FBFCD5h
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                xor byte ptr [eax], al
                add byte ptr [eax], al
                dec eax
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add dl, al
                push eax

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x11ec40x28.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x1412.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                IMAGE_DIRECTORY_ENTRY_IAT0x10000x1ac.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x114d80x12000False0.434828016493data5.9787925967IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .data0x130000xa640x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x140000x14120x2000False0.291259765625data3.29525991326IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x14d4a0x6c8dBase III DBT, version number 0, next free block index 40
                RT_ICON0x143c20x988dBase III DBT, version number 0, next free block index 40
                RT_GROUP_ICON0x143a00x22data
                RT_VERSION0x141200x280dataGuaraniParaguay

                Imports

                DLLImport
                MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaDateVar, _CIlog, __vbaFileOpen, __vbaNew2, __vbaInStr, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarAdd, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaUI1Str, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

                Version Infos

                DescriptionData
                Translation0x0474 0x04b0
                InternalNameAMPUTERE
                FileVersion3.03
                CompanyNamePanasonic
                CommentsPanasonic
                ProductNamePanasonic
                ProductVersion3.03
                FileDescriptionPanasonic
                OriginalFilenameAMPUTERE.exe

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                GuaraniParaguay

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                04/01/21-07:41:42.432040ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:41:42.464302ICMP449ICMP Time-To-Live Exceeded in Transit84.17.52.126192.168.2.6
                04/01/21-07:41:42.470500ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:41:42.502832ICMP449ICMP Time-To-Live Exceeded in Transit5.56.20.161192.168.2.6
                04/01/21-07:41:42.506701ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:41:42.540227ICMP449ICMP Time-To-Live Exceeded in Transit91.206.52.152192.168.2.6
                04/01/21-07:41:42.540792ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:41:46.555734ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:41:50.533063ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:41:54.533682ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:41:58.533986ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:03.273472ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:07.040459ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:11.039405ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:15.035238ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:19.071881ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:23.036318ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:27.037681ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:31.036811ICMP384ICMP PING192.168.2.613.107.4.50
                04/01/21-07:42:31.069811ICMP408ICMP Echo Reply13.107.4.50192.168.2.6

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Apr 1, 2021 07:45:26.435566902 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.478147984 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.478259087 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.479070902 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.521552086 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.534030914 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.534054041 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.534066916 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.534079075 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.534224033 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.551301003 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.594008923 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.594080925 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.594995022 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.642653942 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.876184940 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.876216888 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.876230955 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.876246929 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.876261950 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.876364946 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.876398087 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.879012108 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.879033089 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.879138947 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.882077932 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.882103920 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.882241964 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.885045052 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.885070086 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.885191917 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.888066053 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.888092041 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.888215065 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.896469116 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.896631002 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.897058010 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.897149086 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.920533895 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.920563936 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.920715094 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.921978951 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.922003031 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.922103882 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.924967051 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.924994946 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.925097942 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.927953005 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.927983999 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.928090096 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.930926085 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.930965900 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.931082964 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.933958054 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.933989048 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.934043884 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.934098959 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.936952114 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.937001944 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.937047005 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.937093973 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.939922094 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.939948082 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.940052032 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.942869902 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.942890882 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.943018913 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.945904970 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.945930004 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.946086884 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.948846102 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.948868036 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.948987007 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.951828003 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.951868057 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.951960087 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.954854012 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.954925060 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.954963923 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.954986095 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.957878113 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.957906961 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.957998037 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.960839033 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.960863113 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.960953951 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.964852095 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.964884996 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.965053082 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.966298103 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.966320992 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.966459990 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.968224049 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.968250036 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.968362093 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.970232964 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.970264912 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.970804930 CEST49747443192.168.2.6216.58.215.225
                Apr 1, 2021 07:45:26.972218037 CEST44349747216.58.215.225192.168.2.6
                Apr 1, 2021 07:45:26.972256899 CEST44349747216.58.215.225192.168.2.6

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Apr 1, 2021 07:41:38.070863008 CEST5451353192.168.2.68.8.8.8
                Apr 1, 2021 07:41:38.118454933 CEST53545138.8.8.8192.168.2.6
                Apr 1, 2021 07:41:38.879174948 CEST6204453192.168.2.68.8.8.8
                Apr 1, 2021 07:41:38.929502964 CEST53620448.8.8.8192.168.2.6
                Apr 1, 2021 07:41:39.825949907 CEST6379153192.168.2.68.8.8.8
                Apr 1, 2021 07:41:39.876066923 CEST53637918.8.8.8192.168.2.6
                Apr 1, 2021 07:41:41.726422071 CEST6426753192.168.2.68.8.8.8
                Apr 1, 2021 07:41:41.783688068 CEST53642678.8.8.8192.168.2.6
                Apr 1, 2021 07:41:42.364645004 CEST4944853192.168.2.68.8.8.8
                Apr 1, 2021 07:41:42.421184063 CEST53494488.8.8.8192.168.2.6
                Apr 1, 2021 07:41:43.635649920 CEST6034253192.168.2.68.8.8.8
                Apr 1, 2021 07:41:43.685589075 CEST53603428.8.8.8192.168.2.6
                Apr 1, 2021 07:41:51.600878000 CEST6134653192.168.2.68.8.8.8
                Apr 1, 2021 07:41:51.649561882 CEST53613468.8.8.8192.168.2.6
                Apr 1, 2021 07:41:52.768568993 CEST5177453192.168.2.68.8.8.8
                Apr 1, 2021 07:41:52.816342115 CEST53517748.8.8.8192.168.2.6
                Apr 1, 2021 07:41:53.692286968 CEST5602353192.168.2.68.8.8.8
                Apr 1, 2021 07:41:53.739046097 CEST53560238.8.8.8192.168.2.6
                Apr 1, 2021 07:41:54.686860085 CEST5838453192.168.2.68.8.8.8
                Apr 1, 2021 07:41:54.735239983 CEST53583848.8.8.8192.168.2.6
                Apr 1, 2021 07:41:56.208642006 CEST6026153192.168.2.68.8.8.8
                Apr 1, 2021 07:41:56.254461050 CEST53602618.8.8.8192.168.2.6
                Apr 1, 2021 07:41:57.274804115 CEST5606153192.168.2.68.8.8.8
                Apr 1, 2021 07:41:57.323487997 CEST53560618.8.8.8192.168.2.6
                Apr 1, 2021 07:41:58.575582027 CEST5833653192.168.2.68.8.8.8
                Apr 1, 2021 07:41:58.622155905 CEST53583368.8.8.8192.168.2.6
                Apr 1, 2021 07:41:59.844504118 CEST5378153192.168.2.68.8.8.8
                Apr 1, 2021 07:41:59.893209934 CEST53537818.8.8.8192.168.2.6
                Apr 1, 2021 07:42:04.149950981 CEST5406453192.168.2.68.8.8.8
                Apr 1, 2021 07:42:04.195872068 CEST53540648.8.8.8192.168.2.6
                Apr 1, 2021 07:42:05.189529896 CEST5281153192.168.2.68.8.8.8
                Apr 1, 2021 07:42:05.237653017 CEST53528118.8.8.8192.168.2.6
                Apr 1, 2021 07:42:07.419472933 CEST5529953192.168.2.68.8.8.8
                Apr 1, 2021 07:42:07.465405941 CEST53552998.8.8.8192.168.2.6
                Apr 1, 2021 07:42:08.486334085 CEST6374553192.168.2.68.8.8.8
                Apr 1, 2021 07:42:08.532182932 CEST53637458.8.8.8192.168.2.6
                Apr 1, 2021 07:42:09.296761036 CEST5005553192.168.2.68.8.8.8
                Apr 1, 2021 07:42:09.344470978 CEST53500558.8.8.8192.168.2.6
                Apr 1, 2021 07:42:11.085506916 CEST6137453192.168.2.68.8.8.8
                Apr 1, 2021 07:42:11.141558886 CEST53613748.8.8.8192.168.2.6
                Apr 1, 2021 07:42:33.522531986 CEST5033953192.168.2.68.8.8.8
                Apr 1, 2021 07:42:33.589736938 CEST53503398.8.8.8192.168.2.6
                Apr 1, 2021 07:42:35.327601910 CEST6330753192.168.2.68.8.8.8
                Apr 1, 2021 07:42:35.482263088 CEST53633078.8.8.8192.168.2.6
                Apr 1, 2021 07:42:36.180342913 CEST4969453192.168.2.68.8.8.8
                Apr 1, 2021 07:42:36.237016916 CEST53496948.8.8.8192.168.2.6
                Apr 1, 2021 07:42:37.043318987 CEST5498253192.168.2.68.8.8.8
                Apr 1, 2021 07:42:37.097539902 CEST53549828.8.8.8192.168.2.6
                Apr 1, 2021 07:42:37.534673929 CEST5001053192.168.2.68.8.8.8
                Apr 1, 2021 07:42:37.628061056 CEST53500108.8.8.8192.168.2.6
                Apr 1, 2021 07:42:38.209295988 CEST6371853192.168.2.68.8.8.8
                Apr 1, 2021 07:42:38.255273104 CEST53637188.8.8.8192.168.2.6
                Apr 1, 2021 07:42:38.802638054 CEST6211653192.168.2.68.8.8.8
                Apr 1, 2021 07:42:38.859879017 CEST53621168.8.8.8192.168.2.6
                Apr 1, 2021 07:42:39.162408113 CEST6381653192.168.2.68.8.8.8
                Apr 1, 2021 07:42:39.230982065 CEST53638168.8.8.8192.168.2.6
                Apr 1, 2021 07:42:39.300668955 CEST5501453192.168.2.68.8.8.8
                Apr 1, 2021 07:42:39.355036974 CEST53550148.8.8.8192.168.2.6
                Apr 1, 2021 07:42:40.345225096 CEST6220853192.168.2.68.8.8.8
                Apr 1, 2021 07:42:40.391186953 CEST53622088.8.8.8192.168.2.6
                Apr 1, 2021 07:42:41.812714100 CEST5757453192.168.2.68.8.8.8
                Apr 1, 2021 07:42:41.859698057 CEST53575748.8.8.8192.168.2.6
                Apr 1, 2021 07:42:42.381419897 CEST5181853192.168.2.68.8.8.8
                Apr 1, 2021 07:42:42.437664986 CEST53518188.8.8.8192.168.2.6
                Apr 1, 2021 07:42:56.505729914 CEST5662853192.168.2.68.8.8.8
                Apr 1, 2021 07:42:56.561142921 CEST53566288.8.8.8192.168.2.6
                Apr 1, 2021 07:43:14.194900990 CEST6077853192.168.2.68.8.8.8
                Apr 1, 2021 07:43:14.252999067 CEST53607788.8.8.8192.168.2.6
                Apr 1, 2021 07:43:22.684170961 CEST5379953192.168.2.68.8.8.8
                Apr 1, 2021 07:43:22.733340979 CEST53537998.8.8.8192.168.2.6
                Apr 1, 2021 07:43:28.743518114 CEST5468353192.168.2.68.8.8.8
                Apr 1, 2021 07:43:28.814992905 CEST53546838.8.8.8192.168.2.6
                Apr 1, 2021 07:45:25.612718105 CEST5932953192.168.2.68.8.8.8
                Apr 1, 2021 07:45:25.678809881 CEST53593298.8.8.8192.168.2.6
                Apr 1, 2021 07:45:26.367213011 CEST6402153192.168.2.68.8.8.8
                Apr 1, 2021 07:45:26.431298018 CEST53640218.8.8.8192.168.2.6

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Apr 1, 2021 07:45:26.367213011 CEST192.168.2.68.8.8.80xfc91Standard query (0)doc-14-a0-docs.googleusercontent.comA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Apr 1, 2021 07:45:26.431298018 CEST8.8.8.8192.168.2.60xfc91No error (0)doc-14-a0-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                Apr 1, 2021 07:45:26.431298018 CEST8.8.8.8192.168.2.60xfc91No error (0)googlehosted.l.googleusercontent.com216.58.215.225A (IP address)IN (0x0001)

                HTTPS Packets

                TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                Apr 1, 2021 07:45:26.534079075 CEST216.58.215.225443192.168.2.649747CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Mar 16 20:32:57 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Jun 08 21:32:56 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:07:41:46
                Start date:01/04/2021
                Path:C:\Users\user\Desktop\AMPUTERE.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\AMPUTERE.exe'
                Imagebase:0x400000
                File size:90112 bytes
                MD5 hash:F2FA3C87DE32858F1244FB352873F399
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Visual Basic
                Reputation:low

                General

                Start time:07:45:13
                Start date:01/04/2021
                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\AMPUTERE.exe'
                Imagebase:0xd30000
                File size:53248 bytes
                MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.864518316.000000001DEE1000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000013.00000002.859923887.0000000001102000.00000040.00000001.sdmp, Author: Joe Security
                Reputation:high

                General

                Start time:07:45:13
                Start date:01/04/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff614b90000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >