Loading ...

Play interactive tourEdit tour

Analysis Report PAYMENT CONFIRMATION.exe

Overview

General Information

Sample Name:PAYMENT CONFIRMATION.exe
Analysis ID:385300
MD5:b7724fd635cc9c0ac12af69468d8f734
SHA1:db18fe9a073456a11a8346e510b3d04d6f64adc9
SHA256:6df1420d84c9c0a1427b91fdf3e9fe8b6245f9f8ea3b00658c430106e72d33d8
Tags:AgentTesla
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • kprUEGC.exe (PID: 4156 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: B7724FD635CC9C0AC12AF69468D8F734)
    • kprUEGC.exe (PID: 6672 cmdline: {path} MD5: B7724FD635CC9C0AC12AF69468D8F734)
  • kprUEGC.exe (PID: 6652 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: B7724FD635CC9C0AC12AF69468D8F734)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "ho@almasroor.com042264528mail.almasroor.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000014.00000002.466854304.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.466852718.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.218173630.00000000035A9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.303769479.0000000003CB9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 10 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.PAYMENT CONFIRMATION.exe.37d32c0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              8.2.kprUEGC.exe.3ee32c0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.PAYMENT CONFIRMATION.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  20.2.kprUEGC.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    1.2.PAYMENT CONFIRMATION.exe.37d32c0.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 1.2.PAYMENT CONFIRMATION.exe.37d32c0.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "ho@almasroor.com042264528mail.almasroor.com"}
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: PAYMENT CONFIRMATION.exeJoe Sandbox ML: detected
                      Source: 2.2.PAYMENT CONFIRMATION.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 20.2.kprUEGC.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49742 -> 69.65.3.206:587
                      Source: global trafficTCP traffic: 192.168.2.3:49742 -> 69.65.3.206:587
                      Source: Joe Sandbox ViewASN Name: ASN-GIGENETUS ASN-GIGENETUS
                      Source: global trafficTCP traffic: 192.168.2.3:49742 -> 69.65.3.206:587
                      Source: unknownDNS traffic detected: queries for: mail.almasroor.com
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmp, kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.476420854.000000000340C000.00000004.00000001.sdmpString found in binary or memory: http://almasroor.com
                      Source: kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpString found in binary or memory: http://bQxorv.com
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.476420854.000000000340C000.00000004.00000001.sdmpString found in binary or memory: http://mail.almasroor.com
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.476023319.00000000033D1000.00000004.00000001.sdmpString found in binary or memory: https://IJiNPGixATMzyiVeKdM.org
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%0
                      Source: kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: PAYMENT CONFIRMATION.exe, 00000001.00000002.218173630.00000000035A9000.00000004.00000001.sdmp, PAYMENT CONFIRMATION.exe, 00000002.00000002.466852718.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000008.00000002.303769479.0000000003CB9000.00000004.00000001.sdmp, kprUEGC.exe, 00000014.00000002.466854304.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmp, kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe
                      Source: kprUEGC.exe, 00000008.00000002.302933279.0000000000ED8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWindow created: window name: CLIPBRDWNDCLASS
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow created: window name: CLIPBRDWNDCLASS

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.2.PAYMENT CONFIRMATION.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE39C872Eu002d8914u002d48C3u002dBF35u002dA8B0A9168404u007d/u00311446D9Eu002dE05Fu002d4878u002dAF9Eu002d244D020F16BC.csLarge array initialization: .cctor: array initializer size 11951
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: PAYMENT CONFIRMATION.exe
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017929D
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_00179BE6
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_00B6C164
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_00B6E5B0
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_00B6E5A0
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AA6320
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AA6840
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AAC090
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AA630F
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AA6831
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AAB0A0
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AAB09F
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AAD210
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5929D
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D59BE6
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_015547A0
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_01553CCC
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_01554772
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_01554790
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_01555490
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_0155D820
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007F9BE6
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007F929D
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_0133C164
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_0133E5B0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_0133E5A0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_0057929D
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_00579BE6
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_00CDC164
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_00CDE5A0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_00CDE5B0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_006E9BE6
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_006E929D
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_02A147A0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_02A14718
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_02A1D820
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_05E47530
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_05E494F0
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_05E46918
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_05E46C60
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: kprUEGC.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: PAYMENT CONFIRMATION.exe, 00000001.00000002.217862007.0000000002581000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exe, 00000001.00000000.200737209.0000000000216000.00000002.00020000.sdmpBinary or memory string: OriginalFilename48Vu.exeH vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exe, 00000001.00000002.218173630.00000000035A9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameelxZSujHMHuHJxbAMwLHIgWJxBXR.exe4 vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exe, 00000001.00000002.221887306.00000000056E1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000003.261003873.0000000006B11000.00000004.00000001.sdmpBinary or memory string: OriginalFilename48Vu.exeH vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.466852718.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameelxZSujHMHuHJxbAMwLHIgWJxBXR.exe4 vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.470834629.0000000001320000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.469393946.0000000000FB8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exeBinary or memory string: OriginalFilename48Vu.exeH vs PAYMENT CONFIRMATION.exe
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: kprUEGC.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 2.2.PAYMENT CONFIRMATION.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.PAYMENT CONFIRMATION.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PAYMENT CONFIRMATION.exe.logJump to behavior
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile read: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe 'C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe'
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess created: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe {path}
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess created: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe {path}
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: PAYMENT CONFIRMATION.exeStatic PE information: 0xF55F3D02 [Mon Jun 14 12:30:58 2100 UTC]
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B297 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B501 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B58C push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B023 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B02F push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B928 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B945 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B3E7 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B4E5 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017AEE0 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_0017B5EE push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AAAC68 push eax; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 1_2_04AACE19 push ecx; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5B297 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5B945 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5B3E7 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5AEE0 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5B023 push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5B02F push cs; iretd
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeCode function: 2_2_00D5B928 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007FB02F push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007FB928 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007FB3E7 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007FB023 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007FAEE0 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007FB297 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 8_2_007FB945 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_0057B297 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_0057B945 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_0057B3E7 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 19_2_0057B023 push cs; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.88580318793
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.88580318793
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJump to dropped file
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier read attributes | delete
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4156, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT CONFIRMATION.exe PID: 5940, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: PAYMENT CONFIRMATION.exe, 00000001.00000002.222431551.0000000005B26000.00000004.00000001.sdmp, kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: PAYMENT CONFIRMATION.exe, 00000001.00000002.222431551.0000000005B26000.00000004.00000001.sdmp, kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWindow / User API: threadDelayed 2540
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWindow / User API: threadDelayed 7310
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 5028
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWindow / User API: threadDelayed 4772
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe TID: 2540Thread sleep time: -31500s >= -30000s
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe TID: 2576Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe TID: 5464Thread sleep time: -17524406870024063s >= -30000s
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe TID: 3352Thread sleep count: 2540 > 30
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe TID: 3352Thread sleep count: 7310 > 30
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5952Thread sleep time: -31500s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 4472Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6656Thread sleep time: -31500s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6912Thread sleep time: -17524406870024063s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6916Thread sleep count: 5028 > 30
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6916Thread sleep count: 4772 > 30
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeThread delayed: delay time: 31500
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 31500
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 31500
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.480197568.0000000006B10000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: kprUEGC.exe, 00000008.00000002.307848677.0000000006175000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeProcess created: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe {path}
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe {path}
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.473203991.0000000001B60000.00000002.00000001.sdmp, kprUEGC.exe, 00000014.00000002.471237564.0000000001560000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.473203991.0000000001B60000.00000002.00000001.sdmp, kprUEGC.exe, 00000014.00000002.471237564.0000000001560000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.473203991.0000000001B60000.00000002.00000001.sdmp, kprUEGC.exe, 00000014.00000002.471237564.0000000001560000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: PAYMENT CONFIRMATION.exe, 00000002.00000002.473203991.0000000001B60000.00000002.00000001.sdmp, kprUEGC.exe, 00000014.00000002.471237564.0000000001560000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeCode function: 20_2_05E44FFC GetUserNameW,
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000014.00000002.466854304.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.466852718.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.218173630.00000000035A9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.303769479.0000000003CB9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT CONFIRMATION.exe PID: 2208, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4156, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6672, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT CONFIRMATION.exe PID: 5940, type: MEMORY
                      Source: Yara matchFile source: 1.2.PAYMENT CONFIRMATION.exe.37d32c0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.kprUEGC.exe.3ee32c0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PAYMENT CONFIRMATION.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PAYMENT CONFIRMATION.exe.37d32c0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.kprUEGC.exe.3ee32c0.2.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Desktop\PAYMENT CONFIRMATION.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT CONFIRMATION.exe PID: 2208, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6672, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000014.00000002.466854304.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.466852718.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.218173630.00000000035A9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.303769479.0000000003CB9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT CONFIRMATION.exe PID: 2208, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 4156, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: kprUEGC.exe PID: 6672, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT CONFIRMATION.exe PID: 5940, type: MEMORY
                      Source: Yara matchFile source: 1.2.PAYMENT CONFIRMATION.exe.37d32c0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.kprUEGC.exe.3ee32c0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PAYMENT CONFIRMATION.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.kprUEGC.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PAYMENT CONFIRMATION.exe.37d32c0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.kprUEGC.exe.3ee32c0.2.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection12File and Directory Permissions Modification1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Input Capture111System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSSecurity Software Discovery211Distributed Component Object ModelInput Capture111Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing3LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonTimestomp1Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion131Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection12/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 385300 Sample: PAYMENT CONFIRMATION.exe Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 41 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->41 43 Found malware configuration 2->43 45 Yara detected AgentTesla 2->45 47 7 other signatures 2->47 6 PAYMENT CONFIRMATION.exe 3 2->6         started        9 kprUEGC.exe 3 2->9         started        12 kprUEGC.exe 2 2->12         started        process3 file4 21 C:\Users\...\PAYMENT CONFIRMATION.exe.log, ASCII 6->21 dropped 14 PAYMENT CONFIRMATION.exe 2 5 6->14         started        49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 9->49 51 Machine Learning detection for dropped file 9->51 53 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 9->53 19 kprUEGC.exe 2 9->19         started        signatures5 process6 dnsIp7 29 almasroor.com 69.65.3.206, 49742, 587 ASN-GIGENETUS United States 14->29 31 mail.almasroor.com 14->31 23 C:\Users\user\AppData\Roaming\...\kprUEGC.exe, PE32 14->23 dropped 25 C:\Users\user\...\kprUEGC.exe:Zone.Identifier, ASCII 14->25 dropped 33 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->33 35 Tries to steal Mail credentials (via file access) 14->35 37 Tries to harvest and steal ftp login credentials 14->37 39 4 other signatures 14->39 27 C:\Windows\System32\drivers\etc\hosts, ASCII 19->27 dropped file8 signatures9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PAYMENT CONFIRMATION.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe100%Joe Sandbox ML

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.2.PAYMENT CONFIRMATION.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      20.2.kprUEGC.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://almasroor.com0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://IJiNPGixATMzyiVeKdM.org0%Avira URL Cloudsafe
                      http://bQxorv.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://api.ipify.org%00%Avira URL Cloudsafe
                      http://mail.almasroor.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      almasroor.com
                      69.65.3.206
                      truetrue
                        unknown
                        mail.almasroor.com
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://almasroor.comPAYMENT CONFIRMATION.exe, 00000002.00000002.476420854.000000000340C000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://127.0.0.1:HTTP/1.1PAYMENT CONFIRMATION.exe, 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmp, kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://api.ipify.org%GETMozilla/5.0kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          http://DynDns.comDynDNSkprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://IJiNPGixATMzyiVeKdM.orgPAYMENT CONFIRMATION.exe, 00000002.00000002.476023319.00000000033D1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://bQxorv.comkprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haPAYMENT CONFIRMATION.exe, 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmp, kprUEGC.exe, 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://api.ipify.org%0PAYMENT CONFIRMATION.exe, 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://mail.almasroor.comPAYMENT CONFIRMATION.exe, 00000002.00000002.476420854.000000000340C000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPAYMENT CONFIRMATION.exe, 00000001.00000002.218173630.00000000035A9000.00000004.00000001.sdmp, PAYMENT CONFIRMATION.exe, 00000002.00000002.466852718.0000000000402000.00000040.00000001.sdmp, kprUEGC.exe, 00000008.00000002.303769479.0000000003CB9000.00000004.00000001.sdmp, kprUEGC.exe, 00000014.00000002.466854304.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          69.65.3.206
                          almasroor.comUnited States
                          32181ASN-GIGENETUStrue

                          General Information

                          Joe Sandbox Version:31.0.0 Emerald
                          Analysis ID:385300
                          Start date:12.04.2021
                          Start time:09:57:17
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 12m 16s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:PAYMENT CONFIRMATION.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:30
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 0.1% (good quality ratio 0%)
                          • Quality average: 0%
                          • Quality standard deviation: 0%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 52.147.198.201, 92.122.145.220, 204.79.197.200, 13.107.21.200, 52.255.188.83, 40.88.32.150, 20.82.210.154, 184.30.24.56, 92.122.213.247, 92.122.213.194, 93.184.221.240, 13.88.21.125, 52.155.217.156, 20.54.26.129, 104.42.151.234
                          • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          09:58:05API Interceptor723x Sleep call for process: PAYMENT CONFIRMATION.exe modified
                          09:58:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                          09:58:42AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                          09:58:44API Interceptor493x Sleep call for process: kprUEGC.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          69.65.3.206payment details.exeGet hashmaliciousBrowse
                            payment details.exeGet hashmaliciousBrowse

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              ASN-GIGENETUSMT103_Swift_Transfer#452-567-2XXX.exeGet hashmaliciousBrowse
                              • 45.85.90.86
                              4IxLUYjMQ7.exeGet hashmaliciousBrowse
                              • 172.111.237.51
                              payment details.exeGet hashmaliciousBrowse
                              • 69.65.3.206
                              payment details.exeGet hashmaliciousBrowse
                              • 69.65.3.206
                              AWB-9899691012.exeGet hashmaliciousBrowse
                              • 45.85.90.220
                              swift_76567643.exeGet hashmaliciousBrowse
                              • 70.32.1.32
                              BillOfLading.exeGet hashmaliciousBrowse
                              • 45.85.90.220
                              OPEN01929291000_2021-03-15_07-28.exeGet hashmaliciousBrowse
                              • 45.85.90.188
                              INV242-0303.docGet hashmaliciousBrowse
                              • 45.85.90.197
                              dwg.exeGet hashmaliciousBrowse
                              • 45.85.90.226
                              a55ddff55740467df8dee39a5bbaee32.exeGet hashmaliciousBrowse
                              • 45.85.90.138
                              116e4c42d3948c91eafdcb60a9f37014.exeGet hashmaliciousBrowse
                              • 45.85.90.138
                              771eb3ef5ede516d6ec53ae40b3f888f.exeGet hashmaliciousBrowse
                              • 45.85.90.138
                              Paid Invoice _confirmation_9336639_03993736553.exeGet hashmaliciousBrowse
                              • 216.38.7.225
                              YCVj3q7r5e.exeGet hashmaliciousBrowse
                              • 70.32.1.32
                              VOR001 - McMurray Statements December 2020_87373535737522772662626.exeGet hashmaliciousBrowse
                              • 216.38.7.225
                              Customer_Receivables_Aging_20210112_2663535345242424242.exeGet hashmaliciousBrowse
                              • 216.38.7.225
                              Proforma fatura.exeGet hashmaliciousBrowse
                              • 216.38.2.215
                              Invoice.exeGet hashmaliciousBrowse
                              • 216.38.2.215
                              Purchase Order-34002174,pdf.exeGet hashmaliciousBrowse
                              • 216.38.7.231

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PAYMENT CONFIRMATION.exe.log
                              Process:C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.355304211458859
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kprUEGC.exe.log
                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.355304211458859
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                              Process:C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe
                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):834048
                              Entropy (8bit):7.428971755376777
                              Encrypted:false
                              SSDEEP:12288:IpKyZu+9vsh+aNW314fEJsMXuLvfm7AAFyKWiFydoKVh8onDA4w:h+arklruLW7ZsKWgydFVWUHw
                              MD5:B7724FD635CC9C0AC12AF69468D8F734
                              SHA1:DB18FE9A073456A11A8346E510B3D04D6F64ADC9
                              SHA-256:6DF1420D84C9C0A1427B91FDF3E9FE8B6245F9F8EA3B00658C430106E72D33D8
                              SHA-512:68482D26DE5A521CA4AE2A139C2DEA2EB491381568C344F76C737844162D42F94B117C13C903812EA4CEA5F6D2F130425D5CA869FA8A165AC1D136C25E0C98F7
                              Malicious:true
                              Antivirus:
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Reputation:low
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=_...............0..(...........F... ...`....@.. ....................... ............@..................................F..O....`...............................F............................................... ............... ..H............text....'... ...(.................. ..`.rsrc........`.......*..............@..@.reloc..............................@..B.................F......H...........4o......1........2..........................................".(.....*.r...p.....*..{....*"..}....*..{....*"..}....*".(.....*.0...........r...p.+..*..0...........r...p.+..*".(.....*..{....*"..}....*..{....*"..}....*".(.....*^..}.....(.......(.....*..0............o......,y.s.......{....o....o.......{....o....o.....~......,....(......+....(...........,..(....o.....s....(......+..r...p(....&..*....0..5.........o....r...p(....,..o....r...p(....+....,....+...+..*....0..
                              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier
                              Process:C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview: [ZoneTransfer]....ZoneId=0
                              C:\Windows\System32\drivers\etc\hosts
                              Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):11
                              Entropy (8bit):2.663532754804255
                              Encrypted:false
                              SSDEEP:3:iLE:iLE
                              MD5:B24D295C1F84ECBFB566103374FB91C5
                              SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                              SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                              SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                              Malicious:true
                              Reputation:moderate, very likely benign file
                              Preview: ..127.0.0.1

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.428971755376777
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:PAYMENT CONFIRMATION.exe
                              File size:834048
                              MD5:b7724fd635cc9c0ac12af69468d8f734
                              SHA1:db18fe9a073456a11a8346e510b3d04d6f64adc9
                              SHA256:6df1420d84c9c0a1427b91fdf3e9fe8b6245f9f8ea3b00658c430106e72d33d8
                              SHA512:68482d26de5a521ca4ae2a139c2dea2eb491381568c344f76c737844162d42f94b117c13c903812ea4cea5f6d2f130425d5ca869fa8a165ac1d136c25e0c98f7
                              SSDEEP:12288:IpKyZu+9vsh+aNW314fEJsMXuLvfm7AAFyKWiFydoKVh8onDA4w:h+arklruLW7ZsKWgydFVWUHw
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=_...............0..(...........F... ...`....@.. ....................... ............@................................

                              File Icon

                              Icon Hash:07d8d8d4d4d85026

                              Static PE Info

                              General

                              Entrypoint:0x4a46fa
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0xF55F3D02 [Mon Jun 14 12:30:58 2100 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                              Entrypoint Preview

                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa46a80x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x28c80.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0xa468c0x1c.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xa27000xa2800False0.899269831731data7.88580318793IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0xa60000x28c800x28e00False0.0481293004587data2.99758740857IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xd00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_ICON0xa62b00xc35PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                              RT_ICON0xa6ee80x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 4280119364, next used block 4280119364
                              RT_ICON0xb77100x94a8data
                              RT_ICON0xc0bb80x5488data
                              RT_ICON0xc60400x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0
                              RT_ICON0xca2680x25a8data
                              RT_ICON0xcc8100x10a8data
                              RT_ICON0xcd8b80x988data
                              RT_ICON0xce2400x468GLS_BINARY_LSB_FIRST
                              RT_GROUP_ICON0xce6a80x84data
                              RT_VERSION0xce72c0x366data
                              RT_MANIFEST0xcea940x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                              Imports

                              DLLImport
                              mscoree.dll_CorExeMain

                              Version Infos

                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright Integra Wealth
                              Assembly Version1.8.9.10
                              InternalName48Vu.exe
                              FileVersion1.9.1.0
                              CompanyNameIntegra Wealth
                              LegalTrademarks
                              Comments
                              ProductNameReplacementFallback
                              ProductVersion1.9.1.0
                              FileDescriptionReplacementFallback
                              OriginalFilename48Vu.exe

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              04/12/21-09:59:55.552553TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49742587192.168.2.369.65.3.206

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Apr 12, 2021 09:59:54.088561058 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:54.232836962 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:54.233000040 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:54.663244963 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:54.663727045 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:54.808820009 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:54.811714888 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:54.956993103 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:54.957669020 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.113687992 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:55.114670038 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.259448051 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:55.259762049 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.405204058 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:55.405466080 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.549216032 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:55.549290895 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:55.552552938 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.552654028 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.552716970 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.552788019 CEST49742587192.168.2.369.65.3.206
                              Apr 12, 2021 09:59:55.698920012 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:55.698946953 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:56.236152887 CEST5874974269.65.3.206192.168.2.3
                              Apr 12, 2021 09:59:56.290321112 CEST49742587192.168.2.369.65.3.206

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Apr 12, 2021 09:57:55.587584972 CEST6098553192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:55.638468027 CEST5020053192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:55.639493942 CEST53609858.8.8.8192.168.2.3
                              Apr 12, 2021 09:57:55.704214096 CEST53502008.8.8.8192.168.2.3
                              Apr 12, 2021 09:57:56.377810001 CEST5128153192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:56.440128088 CEST53512818.8.8.8192.168.2.3
                              Apr 12, 2021 09:57:56.450364113 CEST4919953192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:56.498913050 CEST53491998.8.8.8192.168.2.3
                              Apr 12, 2021 09:57:57.269068956 CEST5062053192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:57.317923069 CEST53506208.8.8.8192.168.2.3
                              Apr 12, 2021 09:57:58.068525076 CEST6493853192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:58.120682001 CEST53649388.8.8.8192.168.2.3
                              Apr 12, 2021 09:57:58.821706057 CEST6015253192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:58.870714903 CEST53601528.8.8.8192.168.2.3
                              Apr 12, 2021 09:57:59.638966084 CEST5754453192.168.2.38.8.8.8
                              Apr 12, 2021 09:57:59.687730074 CEST53575448.8.8.8192.168.2.3
                              Apr 12, 2021 09:58:00.577747107 CEST5598453192.168.2.38.8.8.8
                              Apr 12, 2021 09:58:00.626516104 CEST53559848.8.8.8192.168.2.3
                              Apr 12, 2021 09:58:30.339270115 CEST6418553192.168.2.38.8.8.8
                              Apr 12, 2021 09:58:30.390690088 CEST53641858.8.8.8192.168.2.3
                              Apr 12, 2021 09:58:31.080108881 CEST6511053192.168.2.38.8.8.8
                              Apr 12, 2021 09:58:31.128791094 CEST53651108.8.8.8192.168.2.3
                              Apr 12, 2021 09:58:34.399143934 CEST5836153192.168.2.38.8.8.8
                              Apr 12, 2021 09:58:34.457848072 CEST53583618.8.8.8192.168.2.3
                              Apr 12, 2021 09:58:48.740354061 CEST6349253192.168.2.38.8.8.8
                              Apr 12, 2021 09:58:48.804146051 CEST53634928.8.8.8192.168.2.3
                              Apr 12, 2021 09:58:51.585805893 CEST6083153192.168.2.38.8.8.8
                              Apr 12, 2021 09:58:51.645958900 CEST53608318.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:03.086510897 CEST6010053192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:03.138180017 CEST53601008.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:06.837461948 CEST5319553192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:06.909998894 CEST53531958.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:07.632153034 CEST5014153192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:07.692271948 CEST53501418.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:08.284568071 CEST5302353192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:08.382776976 CEST53530238.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:08.687506914 CEST4956353192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:08.756638050 CEST53495638.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:08.792792082 CEST5135253192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:08.895992994 CEST53513528.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:09.449558973 CEST5934953192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:09.509342909 CEST53593498.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:10.151315928 CEST5708453192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:10.213434935 CEST53570848.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:10.714092970 CEST5882353192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:10.762897015 CEST53588238.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:11.785434008 CEST5756853192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:11.843231916 CEST53575688.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:12.802987099 CEST5054053192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:12.828646898 CEST5436653192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:12.853539944 CEST53505408.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:12.887991905 CEST53543668.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:13.582056999 CEST5303453192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:13.647248983 CEST53530348.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:35.013001919 CEST5776253192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:35.064810991 CEST53577628.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:35.850492954 CEST5543553192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:35.899192095 CEST53554358.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:39.907916069 CEST5071353192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:39.958430052 CEST53507138.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:41.477659941 CEST5613253192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:41.529227972 CEST53561328.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:43.152086973 CEST5898753192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:43.200777054 CEST53589878.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:43.928356886 CEST5657953192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:43.977123976 CEST53565798.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:45.453090906 CEST6063353192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:45.525468111 CEST53606338.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:52.986248970 CEST6129253192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:53.037791014 CEST53612928.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:53.629669905 CEST6361953192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:53.803836107 CEST53636198.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:53.826715946 CEST6493853192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:53.999140978 CEST53649388.8.8.8192.168.2.3
                              Apr 12, 2021 09:59:59.819197893 CEST6194653192.168.2.38.8.8.8
                              Apr 12, 2021 09:59:59.867813110 CEST53619468.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Apr 12, 2021 09:59:53.629669905 CEST192.168.2.38.8.8.80x449cStandard query (0)mail.almasroor.comA (IP address)IN (0x0001)
                              Apr 12, 2021 09:59:53.826715946 CEST192.168.2.38.8.8.80xd0ddStandard query (0)mail.almasroor.comA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Apr 12, 2021 09:59:53.803836107 CEST8.8.8.8192.168.2.30x449cNo error (0)mail.almasroor.comalmasroor.comCNAME (Canonical name)IN (0x0001)
                              Apr 12, 2021 09:59:53.803836107 CEST8.8.8.8192.168.2.30x449cNo error (0)almasroor.com69.65.3.206A (IP address)IN (0x0001)
                              Apr 12, 2021 09:59:53.999140978 CEST8.8.8.8192.168.2.30xd0ddNo error (0)mail.almasroor.comalmasroor.comCNAME (Canonical name)IN (0x0001)
                              Apr 12, 2021 09:59:53.999140978 CEST8.8.8.8192.168.2.30xd0ddNo error (0)almasroor.com69.65.3.206A (IP address)IN (0x0001)

                              SMTP Packets

                              TimestampSource PortDest PortSource IPDest IPCommands
                              Apr 12, 2021 09:59:54.663244963 CEST5874974269.65.3.206192.168.2.3220-server302.webhostingpad.com ESMTP Exim 4.93 #2 Mon, 12 Apr 2021 02:59:54 -0500
                              220-We do not authorize the use of this system to transport unsolicited,
                              220 and/or bulk e-mail.
                              Apr 12, 2021 09:59:54.663727045 CEST49742587192.168.2.369.65.3.206EHLO 347688
                              Apr 12, 2021 09:59:54.808820009 CEST5874974269.65.3.206192.168.2.3250-server302.webhostingpad.com Hello 347688 [84.17.52.3]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-AUTH PLAIN LOGIN
                              250-STARTTLS
                              250 HELP
                              Apr 12, 2021 09:59:54.811714888 CEST49742587192.168.2.369.65.3.206AUTH login aG9AYWxtYXNyb29yLmNvbQ==
                              Apr 12, 2021 09:59:54.956993103 CEST5874974269.65.3.206192.168.2.3334 UGFzc3dvcmQ6
                              Apr 12, 2021 09:59:55.113687992 CEST5874974269.65.3.206192.168.2.3235 Authentication succeeded
                              Apr 12, 2021 09:59:55.114670038 CEST49742587192.168.2.369.65.3.206MAIL FROM:<ho@almasroor.com>
                              Apr 12, 2021 09:59:55.259448051 CEST5874974269.65.3.206192.168.2.3250 OK
                              Apr 12, 2021 09:59:55.259762049 CEST49742587192.168.2.369.65.3.206RCPT TO:<ho@almasroor.com>
                              Apr 12, 2021 09:59:55.405204058 CEST5874974269.65.3.206192.168.2.3250 Accepted
                              Apr 12, 2021 09:59:55.405466080 CEST49742587192.168.2.369.65.3.206DATA
                              Apr 12, 2021 09:59:55.549290895 CEST5874974269.65.3.206192.168.2.3354 Enter message, ending with "." on a line by itself
                              Apr 12, 2021 09:59:55.552788019 CEST49742587192.168.2.369.65.3.206.
                              Apr 12, 2021 09:59:56.236152887 CEST5874974269.65.3.206192.168.2.3250 OK id=1lVrUB-0005PN-Fi

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:09:58:04
                              Start date:12/04/2021
                              Path:C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe'
                              Imagebase:0x170000
                              File size:834048 bytes
                              MD5 hash:B7724FD635CC9C0AC12AF69468D8F734
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.218173630.00000000035A9000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:09:58:11
                              Start date:12/04/2021
                              Path:C:\Users\user\Desktop\PAYMENT CONFIRMATION.exe
                              Wow64 process (32bit):true
                              Commandline:{path}
                              Imagebase:0xd50000
                              File size:834048 bytes
                              MD5 hash:B7724FD635CC9C0AC12AF69468D8F734
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.466852718.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.473828679.0000000003151000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:09:58:42
                              Start date:12/04/2021
                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                              Imagebase:0x7f0000
                              File size:834048 bytes
                              MD5 hash:B7724FD635CC9C0AC12AF69468D8F734
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.303769479.0000000003CB9000.00000004.00000001.sdmp, Author: Joe Security
                              Antivirus matches:
                              • Detection: 100%, Joe Sandbox ML
                              Reputation:low

                              General

                              Start time:09:58:50
                              Start date:12/04/2021
                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                              Imagebase:0x570000
                              File size:834048 bytes
                              MD5 hash:B7724FD635CC9C0AC12AF69468D8F734
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              General

                              Start time:09:58:51
                              Start date:12/04/2021
                              Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                              Wow64 process (32bit):true
                              Commandline:{path}
                              Imagebase:0x6e0000
                              File size:834048 bytes
                              MD5 hash:B7724FD635CC9C0AC12AF69468D8F734
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.466854304.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.472291889.0000000002BE1000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >