Loading ...

Play interactive tourEdit tour

Analysis Report RFQ No A'4762QHTECHNICAL DETAILS.exe

Overview

General Information

Sample Name:RFQ No A'4762QHTECHNICAL DETAILS.exe
Analysis ID:385367
MD5:229efbbb09801172c9d35851a3ce484e
SHA1:bfa35ba04c7cce63dc1fdf161cebfa7bd9e63cd2
SHA256:3744807c95cb27f6e9c5ef01f2b5b32a78ceef7016fb54babe6a797977b72763
Infos:

Most interesting Screenshot:

Detection

AgentTesla Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected MultiObfuscated
Yara detected Snake Keylogger
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Beds Obfuscator
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • RFQ No A'4762QHTECHNICAL DETAILS.exe (PID: 5584 cmdline: 'C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe' MD5: 229EFBBB09801172C9D35851A3CE484E)
    • schtasks.exe (PID: 5992 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Snake Keylogger

{"Exfil Mode": "SMTP", "SMTP Info": {"Port": "587", "SMTP Credential": "glory@alyamamha.comuzzNhLK6smtp.alyamamha.com"}}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.473634820.0000000002CE8000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.472526143.0000000002C11000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmpJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.2c90320.2.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.unpackJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
                0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                  0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.raw.unpackJoeSecurity_BedsObfuscatorYara detected Beds ObfuscatorJoe Security
                    0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                      Click to see the 4 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Scheduled temp file as task from temp locationShow sources
                      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe' , ParentImage: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe, ParentProcessId: 5584, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp', ProcessId: 5992

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "SMTP Info": {"Port": "587", "SMTP Credential": "glory@alyamamha.comuzzNhLK6smtp.alyamamha.com"}}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\QscoSjjAofYnyT.exeReversingLabs: Detection: 20%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeVirustotal: Detection: 22%Perma Link
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeReversingLabs: Detection: 20%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\QscoSjjAofYnyT.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeJoe Sandbox ML: detected
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: unknownHTTPS traffic detected: 172.67.188.154:443 -> 192.168.2.3:49718 version: TLS 1.0
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Networking:

                      barindex
                      May check the online IP address of the machineShow sources
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeDNS query: name: checkip.dyndns.org
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeDNS query: name: checkip.dyndns.org
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeDNS query: name: checkip.dyndns.org
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeDNS query: name: checkip.dyndns.org
                      Source: Joe Sandbox ViewIP Address: 131.186.113.70 131.186.113.70
                      Source: Joe Sandbox ViewIP Address: 172.67.188.154 172.67.188.154
                      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: unknownHTTPS traffic detected: 172.67.188.154:443 -> 192.168.2.3:49718 version: TLS 1.0
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndn
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.com
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.org
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.org/HB
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.orgD8
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479925894.000000000C1E0000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0L
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpString found in binary or memory: http://freegeoip.app
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479925894.000000000C1E0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=Createutf-8
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app/xml/
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app/xml/84.17.52.3
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app/xml/84.17.52.3x
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: https://freegeoip.app/xml/LoadCountryNameClipboard
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473634820.0000000002CE8000.00000004.00000001.sdmp, RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443

                      System Summary:

                      barindex
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0087929D
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_012BC164
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_012BE5AB
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_012BE5B0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC54D8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC6490
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC97A8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC3F28
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC46E0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC2113
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CCEB80
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CCABA0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CCDB50
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC8581
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC8590
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC54CA
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC9CC0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC9CE0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC8C40
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC6453
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC2C30
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC8C32
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC6433
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC87A0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC87B0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC9749
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC4F68
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC4F78
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CCDED8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC7ED8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC46D0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC7EE8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC3E7D
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC81D8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC81E8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CCB068
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CCAB91
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC6377
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC7300
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC5318
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC32EA
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC32F8
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC72F0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CCE2B0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC8A51
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_05CC8A60
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE4C880
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE4D2D0
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE4E010
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE44458
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE4D2CB
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE422A0
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.478928457.0000000006020000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.472526143.0000000002C11000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479237220.000000000BA90000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.469874287.0000000000908000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamer8 vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameYE18D5SL.exe4 vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.469960912.0000000000CF6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSystem.Web.Extensions.dllT vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479602095.000000000BE70000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeBinary or memory string: OriginalFilenamer8 vs RFQ No A'4762QHTECHNICAL DETAILS.exe
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: QscoSjjAofYnyT.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/2@3/2
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile created: C:\Users\user\AppData\Roaming\QscoSjjAofYnyT.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6004:120:WilError_01
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9C1F.tmpJump to behavior
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeVirustotal: Detection: 22%
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeReversingLabs: Detection: 20%
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile read: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe 'C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe'
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp'
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                      Data Obfuscation:

                      barindex
                      Yara detected Beds ObfuscatorShow sources
                      Source: Yara matchFile source: 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.479390065.000000000BCC0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RFQ No A'4762QHTECHNICAL DETAILS.exe PID: 5584, type: MEMORY
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.raw.unpack, type: UNPACKEDPE
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exeStatic PE information: 0x8EA81DF5 [Sat Nov 4 04:26:29 2045 UTC]
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_012B5553 push edx; ret
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_012BF65A push 0000003Ah; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE40B68 pushad ; ret
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE46B30 pushfd ; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE46B33 pushfd ; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE40B00 pushad ; ret
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE409E8 push edi; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE409D7 push edi; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE40910 push edi; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE40913 push edi; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE408F1 push edi; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE40841 push edi; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE40858 push edi; iretd
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE4085B push edi; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.86754540187
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.86754540187
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile created: C:\Users\user\AppData\Roaming\QscoSjjAofYnyT.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp'
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: Process Memory Space: RFQ No A'4762QHTECHNICAL DETAILS.exe PID: 5584, type: MEMORY
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Yara detected Beds ObfuscatorShow sources
                      Source: Yara matchFile source: 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.479390065.000000000BCC0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RFQ No A'4762QHTECHNICAL DETAILS.exe PID: 5584, type: MEMORY
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.raw.unpack, type: UNPACKEDPE
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe TID: 6136Thread sleep time: -31500s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeThread delayed: delay time: 31500
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479602095.000000000BE70000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479602095.000000000BE70000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479602095.000000000BE70000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.479602095.000000000BE70000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeCode function: 0_2_0BE4C880 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp'
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.472024904.00000000016A0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.472024904.00000000016A0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.472024904.00000000016A0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.472024904.00000000016A0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeQueries volume information: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe VolumeInformation
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmp, type: MEMORY
                      Yara detected Snake KeyloggerShow sources
                      Source: Yara matchFile source: 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.479390065.000000000BCC0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RFQ No A'4762QHTECHNICAL DETAILS.exe PID: 5584, type: MEMORY
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000000.00000002.473634820.0000000002CE8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.472526143.0000000002C11000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RFQ No A'4762QHTECHNICAL DETAILS.exe PID: 5584, type: MEMORY
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.2c90320.2.raw.unpack, type: UNPACKEDPE

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmp, type: MEMORY
                      Yara detected Snake KeyloggerShow sources
                      Source: Yara matchFile source: 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.479390065.000000000BCC0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RFQ No A'4762QHTECHNICAL DETAILS.exe PID: 5584, type: MEMORY
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.bcc0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.RFQ No A'4762QHTECHNICAL DETAILS.exe.3ec0ca0.4.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection12Masquerading1OS Credential Dumping2Security Software Discovery211Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsSystem Network Configuration Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsTimestomp1DCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      RFQ No A'4762QHTECHNICAL DETAILS.exe22%VirustotalBrowse
                      RFQ No A'4762QHTECHNICAL DETAILS.exe21%ReversingLabsByteCode-MSIL.Trojan.Taskun
                      RFQ No A'4762QHTECHNICAL DETAILS.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\QscoSjjAofYnyT.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\QscoSjjAofYnyT.exe21%ReversingLabsByteCode-MSIL.Trojan.Taskun

                      Unpacked PE Files

                      No Antivirus matches

                      Domains

                      SourceDetectionScannerLabelLink
                      freegeoip.app1%VirustotalBrowse
                      checkip.dyndns.com0%VirustotalBrowse
                      checkip.dyndns.org0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      https://freegeoip.app/xml/0%URL Reputationsafe
                      https://freegeoip.app/xml/0%URL Reputationsafe
                      https://freegeoip.app/xml/0%URL Reputationsafe
                      https://freegeoip.app/xml/0%URL Reputationsafe
                      http://checkip.dyndns.org/0%VirustotalBrowse
                      http://checkip.dyndns.org/0%Avira URL Cloudsafe
                      http://checkip.dyndns.org/HB0%Avira URL Cloudsafe
                      https://freegeoip.app0%URL Reputationsafe
                      https://freegeoip.app0%URL Reputationsafe
                      https://freegeoip.app0%URL Reputationsafe
                      https://freegeoip.app0%URL Reputationsafe
                      https://freegeoip.app/xml/84.17.52.3x0%Avira URL Cloudsafe
                      http://checkip.dyndns.org0%Avira URL Cloudsafe
                      http://checkip.dyndns.com0%Avira URL Cloudsafe
                      https://freegeoip.app/xml/LoadCountryNameClipboard0%URL Reputationsafe
                      https://freegeoip.app/xml/LoadCountryNameClipboard0%URL Reputationsafe
                      https://freegeoip.app/xml/LoadCountryNameClipboard0%URL Reputationsafe
                      https://freegeoip.app/xml/84.17.52.30%Avira URL Cloudsafe
                      http://freegeoip.app0%URL Reputationsafe
                      http://freegeoip.app0%URL Reputationsafe
                      http://freegeoip.app0%URL Reputationsafe
                      http://checkip.dyndn0%URL Reputationsafe
                      http://checkip.dyndn0%URL Reputationsafe
                      http://checkip.dyndn0%URL Reputationsafe
                      http://checkip.dyndns.orgD80%URL Reputationsafe
                      http://checkip.dyndns.orgD80%URL Reputationsafe
                      http://checkip.dyndns.orgD80%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      freegeoip.app
                      172.67.188.154
                      truefalseunknown
                      checkip.dyndns.com
                      131.186.113.70
                      truefalseunknown
                      checkip.dyndns.org
                      unknown
                      unknowntrueunknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://freegeoip.app/xml/RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://checkip.dyndns.org/HBRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://freegeoip.appRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/bot/sendMessage?chat_id=&text=Createutf-8RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpfalse
                        high
                        https://freegeoip.app/xml/84.17.52.3xRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://checkip.dyndns.orgRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://checkip.dyndns.comRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpfalse
                          high
                          https://freegeoip.app/xml/LoadCountryNameClipboardRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://freegeoip.app/xml/84.17.52.3RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473542067.0000000002CC9000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://freegeoip.appRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndnRFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndns.orgD8RFQ No A'4762QHTECHNICAL DETAILS.exe, 00000000.00000002.474638080.0000000002E97000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          131.186.113.70
                          checkip.dyndns.comUnited States
                          33517DYNDNSUSfalse
                          172.67.188.154
                          freegeoip.appUnited States
                          13335CLOUDFLARENETUSfalse

                          General Information

                          Joe Sandbox Version:31.0.0 Emerald
                          Analysis ID:385367
                          Start date:12.04.2021
                          Start time:11:36:20
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 6m 46s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:RFQ No A'4762QHTECHNICAL DETAILS.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:29
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@4/2@3/2
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 0.1% (good quality ratio 0%)
                          • Quality average: 43.2%
                          • Quality standard deviation: 43.3%
                          HCA Information:
                          • Successful, ratio: 98%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 13.88.21.125, 131.253.33.200, 13.107.22.200, 93.184.220.29, 92.122.145.220, 168.61.161.212, 13.64.90.137, 20.50.102.62, 184.30.24.56, 92.122.213.194, 92.122.213.247, 52.155.217.156, 20.54.26.129, 20.82.210.154
                          • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          11:37:10API Interceptor1x Sleep call for process: RFQ No A'4762QHTECHNICAL DETAILS.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          131.186.113.70Confirm Order for SK TRIMS & INDUSTRIES_DK4571,pdf.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          JSTCG21040600210 xlxs.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          fyi.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          SecuriteInfo.com.Trojan.DownloaderNET.154.8159.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          PURCHASE ORDER - XIFFA55,pdf.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          cricket.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          SecuriteInfo.com.Artemis34DBCAD2CB5A.27289.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          Yeni siparis _WJO-001, pdf.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          Yeni siparis _WJO-001, pdf.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          Payment Slip E05060_47.docGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          Urgent RFQ_AP65425652_040621,pdf.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          PURCHASE ORDER - XIFFA55.PDF.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          AD1-2001028L.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          PO XIFFA55,pdf.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          PURCHASE ORDER - E3007921.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          SWIFT copy.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          Inquiries.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          8090800.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          IMG_501_367_089.docGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          CE90343555.exeGet hashmaliciousBrowse
                          • checkip.dyndns.org/
                          172.67.188.1543MndTUzGQn.exeGet hashmaliciousBrowse
                          • freegeoip.app/json

                          Domains

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          freegeoip.appConfirm Order for SK TRIMS & INDUSTRIES_DK4571,pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          SOA.exeGet hashmaliciousBrowse
                          • 104.21.19.200
                          RFQ No A'4762GHTECHNICAL DETAILS.exeGet hashmaliciousBrowse
                          • 104.21.19.200
                          JSTCG21040600210 xlxs.exeGet hashmaliciousBrowse
                          • 104.21.19.200
                          PAYMENT RECEIPT.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          fyi.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          reconocer PO #700-20 D462021,pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          EJ000.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          KOCjBQexoH.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          36crb2VRQn.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Message Body.exeGet hashmaliciousBrowse
                          • 104.21.19.200
                          RFQ 100400806 SUPPLY.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          PANORAMICA,pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Purchase_skyN39331,pdf.exeGet hashmaliciousBrowse
                          • 104.21.19.200
                          SecuriteInfo.com.Trojan.DownloaderNET.154.8159.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          PRODUCT_INQUIRY_PO_0009044_PDF.exeGet hashmaliciousBrowse
                          • 104.21.19.200
                          ETL_126_072_60.docGet hashmaliciousBrowse
                          • 104.21.19.200
                          MT103_YIU LIAN08042021_Xerox Scan_202104_.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          lfQuSBwdSf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          PURCHASE ORDER - XIFFA55,pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          checkip.dyndns.comConfirm Order for SK TRIMS & INDUSTRIES_DK4571,pdf.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          SOA.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          RFQ No A'4762GHTECHNICAL DETAILS.exeGet hashmaliciousBrowse
                          • 216.146.43.70
                          JSTCG21040600210 xlxs.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          PAYMENT RECEIPT.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          fyi.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          reconocer PO #700-20 D462021,pdf.exeGet hashmaliciousBrowse
                          • 162.88.193.70
                          EJ000.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          KOCjBQexoH.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          36crb2VRQn.exeGet hashmaliciousBrowse
                          • 162.88.193.70
                          Message Body.exeGet hashmaliciousBrowse
                          • 216.146.43.71
                          RFQ 100400806 SUPPLY.exeGet hashmaliciousBrowse
                          • 216.146.43.71
                          PANORAMICA,pdf.exeGet hashmaliciousBrowse
                          • 216.146.43.70
                          Purchase_skyN39331,pdf.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          SecuriteInfo.com.Trojan.DownloaderNET.154.8159.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          PRODUCT_INQUIRY_PO_0009044_PDF.exeGet hashmaliciousBrowse
                          • 216.146.43.70
                          ETL_126_072_60.docGet hashmaliciousBrowse
                          • 216.146.43.70
                          MT103_YIU LIAN08042021_Xerox Scan_202104_.exeGet hashmaliciousBrowse
                          • 216.146.43.71
                          lfQuSBwdSf.exeGet hashmaliciousBrowse
                          • 162.88.193.70
                          PURCHASE ORDER - XIFFA55,pdf.exeGet hashmaliciousBrowse
                          • 131.186.113.70

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          DYNDNSUSConfirm Order for SK TRIMS & INDUSTRIES_DK4571,pdf.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          SOA.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          RFQ No A'4762GHTECHNICAL DETAILS.exeGet hashmaliciousBrowse
                          • 216.146.43.70
                          JSTCG21040600210 xlxs.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          PAYMENT RECEIPT.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          fyi.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          reconocer PO #700-20 D462021,pdf.exeGet hashmaliciousBrowse
                          • 162.88.193.70
                          EJ000.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          KOCjBQexoH.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          36crb2VRQn.exeGet hashmaliciousBrowse
                          • 162.88.193.70
                          Message Body.exeGet hashmaliciousBrowse
                          • 216.146.43.71
                          RFQ 100400806 SUPPLY.exeGet hashmaliciousBrowse
                          • 216.146.43.71
                          PANORAMICA,pdf.exeGet hashmaliciousBrowse
                          • 216.146.43.70
                          Purchase_skyN39331,pdf.exeGet hashmaliciousBrowse
                          • 131.186.161.70
                          SecuriteInfo.com.Trojan.DownloaderNET.154.8159.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          PRODUCT_INQUIRY_PO_0009044_PDF.exeGet hashmaliciousBrowse
                          • 216.146.43.70
                          MT103_YIU LIAN08042021_Xerox Scan_202104_.exeGet hashmaliciousBrowse
                          • 216.146.43.71
                          lfQuSBwdSf.exeGet hashmaliciousBrowse
                          • 162.88.193.70
                          PURCHASE ORDER - XIFFA55,pdf.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          PRICE_QUOTATION_RFQ_000988_PDF.exeGet hashmaliciousBrowse
                          • 131.186.113.70
                          CLOUDFLARENETUSRechung-2021.12.04.2021.pdf.exeGet hashmaliciousBrowse
                          • 162.159.130.233
                          INV_0008434567987.docGet hashmaliciousBrowse
                          • 172.67.222.176
                          mfalomirm@gentalia.eu.HTMGet hashmaliciousBrowse
                          • 104.19.133.58
                          KHAWATMI CO.IMPORT & EXPORT_PDF.exeGet hashmaliciousBrowse
                          • 104.21.17.57
                          YNzE2QUkvaTK7kd.exeGet hashmaliciousBrowse
                          • 172.67.148.14
                          NdBLyH2h5d.exeGet hashmaliciousBrowse
                          • 23.227.38.74
                          s6G3ZtvHZg.exeGet hashmaliciousBrowse
                          • 172.67.130.43
                          4oItdZkNOZ.exeGet hashmaliciousBrowse
                          • 23.227.38.74
                          ieuHgdpuPo.exeGet hashmaliciousBrowse
                          • 104.21.17.57
                          Cobro Juridico_0420198202_326828_4985792583130360_300690_8122300886764676459_5190713730838_pdf.exeGet hashmaliciousBrowse
                          • 172.67.222.176
                          Payment Slip.docGet hashmaliciousBrowse
                          • 104.21.17.57
                          Cobro Juridico_0291662728_7023446_452487041454723_016698_5192136884256735776_2301761820735_pdf.exeGet hashmaliciousBrowse
                          • 104.21.17.57
                          INQUIRY 1820521 pdf.exeGet hashmaliciousBrowse
                          • 104.21.82.58
                          PaymentCopy.vbsGet hashmaliciousBrowse
                          • 172.67.222.131
                          PAYMENT COPY.exeGet hashmaliciousBrowse
                          • 104.21.28.135
                          PO NUMBER 3120386 3120393 SIGNED.exeGet hashmaliciousBrowse
                          • 1.2.3.4
                          Cobro Juridico_07223243630_5643594_539661009070075_49874359_5059639084170590400_7272781644_pdf.exeGet hashmaliciousBrowse
                          • 172.67.222.176
                          BL2659618800638119374.xls.exeGet hashmaliciousBrowse
                          • 172.67.222.176
                          Purchase order and quote confirmation.exeGet hashmaliciousBrowse
                          • 172.67.222.176
                          Confirm Order for SK TRIMS & INDUSTRIES_DK4571,pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154

                          JA3 Fingerprints

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          54328bd36c14bd82ddaa0c04b25ed9adRechung-2021.12.04.2021.pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          KHAWATMI CO.IMPORT & EXPORT_PDF.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          ieuHgdpuPo.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Cobro Juridico_0420198202_326828_4985792583130360_300690_8122300886764676459_5190713730838_pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Cobro Juridico_0291662728_7023446_452487041454723_016698_5192136884256735776_2301761820735_pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Cobro Juridico_07223243630_5643594_539661009070075_49874359_5059639084170590400_7272781644_pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          BL2659618800638119374.xls.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Purchase order and quote confirmation.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Confirm Order for SK TRIMS & INDUSTRIES_DK4571,pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Re Confirm#U00ffthe invoice#U00ffthe payment slip.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          SOA.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          RFQ No A'4762GHTECHNICAL DETAILS.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          GQ5JvPEI6c.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          JSTCG21040600210 xlxs.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          PAYMENT RECEIPT.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          COMMERCIAL INVOICE N#U00c2#U00ba 0001792E21.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          9479_pdf.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          fyi.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          MINUSCA P01-21.exeGet hashmaliciousBrowse
                          • 172.67.188.154
                          Invoice-ID-(87656532).vbsGet hashmaliciousBrowse
                          • 172.67.188.154

                          Dropped Files

                          No context

                          Created / dropped Files

                          C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp
                          Process:C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1647
                          Entropy (8bit):5.197683476639004
                          Encrypted:false
                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBuBtn:cbh47TlNQ//rydbz9I3YODOLNdq3I
                          MD5:37FC4BD0D262FDAF006E8C7A4B7468F3
                          SHA1:899AA212659232891A464070114278B24C7AADBA
                          SHA-256:381DA5EA1C882FEDC5BCA004457C3EFE5773D6AA7632C83F6601C11422256F8F
                          SHA-512:1D498AFB062EBCF83A625A02E2CED603D58257B2B52E0B61EDD9BE43065BFC2A2C47146320FE7D4FA145FE15F90FCE5C1C6CFC7B7EFF6AC62C871EE45BD93C7B
                          Malicious:true
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                          C:\Users\user\AppData\Roaming\QscoSjjAofYnyT.exe
                          Process:C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):611328
                          Entropy (8bit):7.859751813686353
                          Encrypted:false
                          SSDEEP:12288:XaRN/cqUrIyKEiFzxpETMWMFUcl0qtxc1y:Xac9OEibSTMCcl09o
                          MD5:229EFBBB09801172C9D35851A3CE484E
                          SHA1:BFA35BA04C7CCE63DC1FDF161CEBFA7BD9E63CD2
                          SHA-256:3744807C95CB27F6E9C5EF01F2B5B32A78CEEF7016FB54BABE6A797977B72763
                          SHA-512:F59E194C95CF1BCE01AC97AB989CC69AAA95E87A18E1C640BB0196FA479ADD9754D7EE77F26562B0CEC0D66A4BEE535703CAFCDA4F7359B546D785190A7CADCA
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 21%
                          Reputation:low
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..J..........Nh... ........@.. ....................................@..................................g..O....................................g............................................... ............... ..H............text...TH... ...J.................. ..`.rsrc................L..............@..@.reloc...............R..............@..B................0h......H...........@o......1........T..........................................".(.....*.r...p.....*..{....*"..}....*..{....*"..}....*".(.....*.0...........r...p.+..*..0...........r...p.+..*".(.....*..{....*"..}....*..{....*"..}....*".(.....*^..}.....(.......(.....*..0............o......,y.s.......{....o....o.......{....o....o.....~......,....(......+....(...........,..(....o.....s....(......+..r...p(....&..*....0..5.........o....r...p(....,..o....r...p(....+....,....+...+..*....0..

                          Static File Info

                          General

                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.859751813686353
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          • Win32 Executable (generic) a (10002005/4) 49.75%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:RFQ No A'4762QHTECHNICAL DETAILS.exe
                          File size:611328
                          MD5:229efbbb09801172c9d35851a3ce484e
                          SHA1:bfa35ba04c7cce63dc1fdf161cebfa7bd9e63cd2
                          SHA256:3744807c95cb27f6e9c5ef01f2b5b32a78ceef7016fb54babe6a797977b72763
                          SHA512:f59e194c95cf1bce01ac97ab989cc69aaa95e87a18e1c640bb0196fa479add9754d7ee77f26562b0cec0d66a4bee535703cafcda4f7359b546d785190a7cadca
                          SSDEEP:12288:XaRN/cqUrIyKEiFzxpETMWMFUcl0qtxc1y:Xac9OEibSTMCcl09o
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..J..........Nh... ........@.. ....................................@................................

                          File Icon

                          Icon Hash:00828e8e8686b000

                          Static PE Info

                          General

                          Entrypoint:0x49684e
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                          Time Stamp:0x8EA81DF5 [Sat Nov 4 04:26:29 2045 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:v4.0.30319
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                          Entrypoint Preview

                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al

                          Data Directories

                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x967fc0x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x980000x5f8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x967e00x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                          Sections

                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x948540x94a00False0.889575339045data7.86754540187IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          .rsrc0x980000x5f80x600False0.440755208333data4.258989477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x9a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                          Resources

                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0x980900x366data
                          RT_MANIFEST0x984080x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                          Imports

                          DLLImport
                          mscoree.dll_CorExeMain

                          Version Infos

                          DescriptionData
                          Translation0x0000 0x04b0
                          LegalCopyrightCopyright Integra Wealth
                          Assembly Version1.8.9.10
                          InternalNamer.exe
                          FileVersion1.9.1.0
                          CompanyNameIntegra Wealth
                          LegalTrademarks
                          Comments
                          ProductNameReplacementFallback
                          ProductVersion1.9.1.0
                          FileDescriptionReplacementFallback
                          OriginalFilenamer.exe

                          Network Behavior

                          Network Port Distribution

                          TCP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Apr 12, 2021 11:37:14.259453058 CEST4971680192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.321317911 CEST8049716131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.321487904 CEST4971680192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.322391987 CEST4971680192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.382623911 CEST8049716131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.382662058 CEST8049716131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.382684946 CEST8049716131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.382833004 CEST4971680192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.383936882 CEST4971680192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.444139004 CEST8049716131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.475239992 CEST4971780192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.536591053 CEST8049717131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.536684990 CEST4971780192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.537447929 CEST4971780192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.598752022 CEST8049717131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.598804951 CEST8049717131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.598855019 CEST8049717131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:14.599024057 CEST4971780192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.599848986 CEST4971780192.168.2.3131.186.113.70
                          Apr 12, 2021 11:37:14.661312103 CEST8049717131.186.113.70192.168.2.3
                          Apr 12, 2021 11:37:15.636893988 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:37:15.688484907 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:15.688607931 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:37:15.728559017 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:37:15.780066967 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:15.785190105 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:15.785211086 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:15.785406113 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:37:15.795664072 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:37:15.849005938 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:15.849282980 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:15.891508102 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:37:15.896435976 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:37:15.948019028 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:16.004017115 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:16.004048109 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:37:16.004134893 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:38:56.038856030 CEST49718443192.168.2.3172.67.188.154
                          Apr 12, 2021 11:38:56.092046976 CEST44349718172.67.188.154192.168.2.3
                          Apr 12, 2021 11:38:56.092129946 CEST49718443192.168.2.3172.67.188.154

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Apr 12, 2021 11:37:02.075067043 CEST4919953192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:02.123822927 CEST53491998.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:02.197729111 CEST5062053192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:02.272211075 CEST53506208.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:02.481626987 CEST6493853192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:02.535183907 CEST53649388.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:02.751250029 CEST6015253192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:02.811563969 CEST53601528.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:03.355627060 CEST5754453192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:03.405927896 CEST53575448.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:04.256092072 CEST5598453192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:04.304872036 CEST53559848.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:05.209270954 CEST6418553192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:05.262332916 CEST53641858.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:06.623615026 CEST6511053192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:06.672255993 CEST53651108.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:07.755645990 CEST5836153192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:07.804367065 CEST53583618.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:08.631408930 CEST6349253192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:08.682194948 CEST53634928.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:09.757807970 CEST6083153192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:09.808001041 CEST53608318.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:10.705699921 CEST6010053192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:10.761672974 CEST53601008.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:11.649863958 CEST5319553192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:11.698684931 CEST53531958.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:14.106566906 CEST5014153192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:14.158390999 CEST53501418.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:14.180814028 CEST5302353192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:14.229562044 CEST53530238.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:15.572236061 CEST4956353192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:15.634001017 CEST53495638.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:15.944880009 CEST5135253192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:15.996675014 CEST53513528.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:16.948900938 CEST5934953192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:17.006350040 CEST53593498.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:18.056193113 CEST5708453192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:18.108208895 CEST53570848.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:19.183157921 CEST5882353192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:19.232482910 CEST53588238.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:21.441648006 CEST5756853192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:21.490380049 CEST53575688.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:22.368689060 CEST5054053192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:22.417583942 CEST53505408.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:37.004416943 CEST5436653192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:37.053208113 CEST53543668.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:37.394790888 CEST5303453192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:37.457628012 CEST53530348.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:37.914904118 CEST5776253192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:37.966495991 CEST53577628.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:39.009825945 CEST5543553192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:39.069066048 CEST53554358.8.8.8192.168.2.3
                          Apr 12, 2021 11:37:46.512948036 CEST5071353192.168.2.38.8.8.8
                          Apr 12, 2021 11:37:46.572705984 CEST53507138.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:03.394474983 CEST5613253192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:03.510359049 CEST53561328.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:04.072164059 CEST5898753192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:04.129156113 CEST53589878.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:04.483156919 CEST5657953192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:04.548268080 CEST53565798.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:04.703880072 CEST6063353192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:04.761075974 CEST53606338.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:05.216237068 CEST6129253192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:05.276561975 CEST53612928.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:05.792805910 CEST6361953192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:05.941467047 CEST53636198.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:06.527621984 CEST6493853192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:06.612879992 CEST53649388.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:07.184705019 CEST6194653192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:07.293843031 CEST53619468.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:09.072093010 CEST6491053192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:09.121021032 CEST53649108.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:10.160310984 CEST5212353192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:10.218971968 CEST53521238.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:10.689018965 CEST5613053192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:10.747669935 CEST53561308.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:16.009843111 CEST5633853192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:16.070530891 CEST53563388.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:46.866910934 CEST5942053192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:47.476486921 CEST53594208.8.8.8192.168.2.3
                          Apr 12, 2021 11:38:48.745969057 CEST5878453192.168.2.38.8.8.8
                          Apr 12, 2021 11:38:48.803812027 CEST53587848.8.8.8192.168.2.3

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Apr 12, 2021 11:37:14.106566906 CEST192.168.2.38.8.8.80x8dadStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.180814028 CEST192.168.2.38.8.8.80x97e1Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:15.572236061 CEST192.168.2.38.8.8.80xe9dcStandard query (0)freegeoip.appA (IP address)IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Apr 12, 2021 11:37:14.158390999 CEST8.8.8.8192.168.2.30x8dadNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                          Apr 12, 2021 11:37:14.158390999 CEST8.8.8.8192.168.2.30x8dadNo error (0)checkip.dyndns.com131.186.113.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.158390999 CEST8.8.8.8192.168.2.30x8dadNo error (0)checkip.dyndns.com216.146.43.71A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.158390999 CEST8.8.8.8192.168.2.30x8dadNo error (0)checkip.dyndns.com131.186.161.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.158390999 CEST8.8.8.8192.168.2.30x8dadNo error (0)checkip.dyndns.com216.146.43.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.158390999 CEST8.8.8.8192.168.2.30x8dadNo error (0)checkip.dyndns.com162.88.193.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.229562044 CEST8.8.8.8192.168.2.30x97e1No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                          Apr 12, 2021 11:37:14.229562044 CEST8.8.8.8192.168.2.30x97e1No error (0)checkip.dyndns.com216.146.43.71A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.229562044 CEST8.8.8.8192.168.2.30x97e1No error (0)checkip.dyndns.com131.186.113.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.229562044 CEST8.8.8.8192.168.2.30x97e1No error (0)checkip.dyndns.com131.186.161.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.229562044 CEST8.8.8.8192.168.2.30x97e1No error (0)checkip.dyndns.com216.146.43.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:14.229562044 CEST8.8.8.8192.168.2.30x97e1No error (0)checkip.dyndns.com162.88.193.70A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:15.634001017 CEST8.8.8.8192.168.2.30xe9dcNo error (0)freegeoip.app172.67.188.154A (IP address)IN (0x0001)
                          Apr 12, 2021 11:37:15.634001017 CEST8.8.8.8192.168.2.30xe9dcNo error (0)freegeoip.app104.21.19.200A (IP address)IN (0x0001)

                          HTTP Request Dependency Graph

                          • checkip.dyndns.org

                          HTTP Packets

                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          0192.168.2.349716131.186.113.7080C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe
                          TimestampkBytes transferredDirectionData
                          Apr 12, 2021 11:37:14.322391987 CEST1081OUTGET / HTTP/1.1
                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                          Host: checkip.dyndns.org
                          Connection: Keep-Alive
                          Apr 12, 2021 11:37:14.382662058 CEST1081INHTTP/1.1 200 OK
                          Content-Type: text/html
                          Server: DynDNS-CheckIP/1.0.1
                          Connection: close
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Length: 102
                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.3</body></html>


                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          1192.168.2.349717131.186.113.7080C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe
                          TimestampkBytes transferredDirectionData
                          Apr 12, 2021 11:37:14.537447929 CEST1082OUTGET / HTTP/1.1
                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                          Host: checkip.dyndns.org
                          Apr 12, 2021 11:37:14.598804951 CEST1082INHTTP/1.1 200 OK
                          Content-Type: text/html
                          Server: DynDNS-CheckIP/1.0.1
                          Connection: close
                          Cache-Control: no-cache
                          Pragma: no-cache
                          Content-Length: 102
                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.3</body></html>


                          HTTPS Packets

                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                          Apr 12, 2021 11:37:15.785211086 CEST172.67.188.154443192.168.2.349718CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Aug 10 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Tue Aug 10 14:00:00 CEST 2021 Wed Jan 01 00:59:59 CET 2025769,49162-49161-49172-49171-53-47-10,0-10-11-35-23-65281,29-23-24,054328bd36c14bd82ddaa0c04b25ed9ad
                          CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:11:37:09
                          Start date:12/04/2021
                          Path:C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Users\user\Desktop\RFQ No A'4762QHTECHNICAL DETAILS.exe'
                          Imagebase:0x870000
                          File size:611328 bytes
                          MD5 hash:229EFBBB09801172C9D35851A3CE484E
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.473634820.0000000002CE8000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.473678406.0000000002CF2000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.472526143.0000000002C11000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.475988745.0000000003C39000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_BedsObfuscator, Description: Yara detected Beds Obfuscator, Source: 00000000.00000002.479390065.000000000BCC0000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.479390065.000000000BCC0000.00000004.00000001.sdmp, Author: Joe Security
                          Reputation:low

                          General

                          Start time:11:37:12
                          Start date:12/04/2021
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\QscoSjjAofYnyT' /XML 'C:\Users\user\AppData\Local\Temp\tmp9C1F.tmp'
                          Imagebase:0x1190000
                          File size:185856 bytes
                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:11:37:12
                          Start date:12/04/2021
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6b2800000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Disassembly

                          Code Analysis

                          Reset < >