Loading ...

Play interactive tourEdit tour

Analysis Report faktura.exe

Overview

General Information

Sample Name:faktura.exe
Analysis ID:385392
MD5:4a4501e0665974a9aee852ea13e6e7f6
SHA1:200399b39a95fa717ccd64e51c7b5515e4b1a3a7
SHA256:cb4b104a48fd8927dd979c9f7381707470432540161a2be6e1eabcee470020b8
Tags:GuLoader
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Sigma detected: RegAsm connects to smtp port
Yara detected AgentTesla
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • faktura.exe (PID: 7016 cmdline: 'C:\Users\user\Desktop\faktura.exe' MD5: 4A4501E0665974A9AEE852EA13E6E7F6)
    • RegAsm.exe (PID: 6160 cmdline: 'C:\Users\user\Desktop\faktura.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 6148 cmdline: 'C:\Users\user\Desktop\faktura.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 3476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=14NOGnWkPLNy6theJEcWu4MGC0ytBSV3L", "Injection Process": ["RegAsm.exe", "RegSvcs.exe", "MSBuild.exe"]}

Threatname: Agenttesla

{"Username: ": "kwiG9npnHBMTywq", "URL: ": "https://kij0jMdbT7S0DxfQ.net", "To: ": "", "ByHost: ": "mail.felgui.pt:587", "Password: ": "5ghXavUhzAY", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.904555277.0000000000FA1000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: RegAsm.exe PID: 6148JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 6148JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: RegAsm connects to smtp portShow sources
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 185.31.158.175, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, Initiated: true, ProcessId: 6148, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49773

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000003.00000002.904555277.0000000000FA1000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=14NOGnWkPLNy6theJEcWu4MGC0ytBSV3L", "Injection Process": ["RegAsm.exe", "RegSvcs.exe", "MSBuild.exe"]}
            Source: RegAsm.exe.6148.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "kwiG9npnHBMTywq", "URL: ": "https://kij0jMdbT7S0DxfQ.net", "To: ": "", "ByHost: ": "mail.felgui.pt:587", "Password: ": "5ghXavUhzAY", "From: ": ""}
            Multi AV Scanner detection for submitted fileShow sources
            Source: faktura.exeVirustotal: Detection: 32%Perma Link
            Source: faktura.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: unknownHTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000003.00000002.907361254.000000001CC70000.00000002.00000001.sdmp

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=14NOGnWkPLNy6theJEcWu4MGC0ytBSV3L
            Source: Malware configuration extractorURLs: https://kij0jMdbT7S0DxfQ.net
            Source: global trafficTCP traffic: 192.168.2.4:49773 -> 185.31.158.175:587
            Source: Joe Sandbox ViewASN Name: ONILisbonPortugalPT ONILisbonPortugalPT
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficTCP traffic: 192.168.2.4:49773 -> 185.31.158.175:587
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1DB2A09A recv,
            Source: unknownDNS traffic detected: queries for: doc-0o-7c-docs.googleusercontent.com
            Source: RegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://HgEvCf.com
            Source: RegAsm.exeString found in binary or memory: https://drive.google.com/uc?export=download&id=14NOGnWkPLNy6theJEcWu4MGC0ytBSV3L
            Source: RegAsm.exe, 00000003.00000002.908354318.000000001DD79000.00000004.00000001.sdmpString found in binary or memory: https://kij0jMdbT7S0DxfQ.net
            Source: RegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownHTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.4:49742 version: TLS 1.2

            System Summary:

            barindex
            Potential malicious icon foundShow sources
            Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_022E384F NtResumeThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA33F9 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA384F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1DB2B0BA NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1DB2B089 NtQuerySystemInformation,
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_004015B8
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_0040827D
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_00405950
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_00406351
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_022E3BD9
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA3BD9
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1DB2283C
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1FEEB5E8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1FEE9989
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1FEEDC90
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_20B13B98
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_20B145F8
            Source: faktura.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: faktura.exe, 00000000.00000002.686595654.00000000021E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs faktura.exe
            Source: faktura.exe, 00000000.00000002.687182912.0000000002A80000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamelnoverfrslers.exeFE2XPixarPixar vs faktura.exe
            Source: faktura.exe, 00000000.00000000.638569648.0000000000415000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamelnoverfrslers.exe vs faktura.exe
            Source: faktura.exeBinary or memory string: OriginalFilenamelnoverfrslers.exe vs faktura.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
            Source: faktura.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@6/1@2/2
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1DB2AF3E AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1DB2AF07 AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3476:120:WilError_01
            Source: faktura.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\faktura.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\faktura.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: faktura.exeVirustotal: Detection: 32%
            Source: unknownProcess created: C:\Users\user\Desktop\faktura.exe 'C:\Users\user\Desktop\faktura.exe'
            Source: C:\Users\user\Desktop\faktura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\faktura.exe'
            Source: C:\Users\user\Desktop\faktura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\faktura.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\faktura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\faktura.exe'
            Source: C:\Users\user\Desktop\faktura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\faktura.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000003.00000002.907361254.000000001CC70000.00000002.00000001.sdmp

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000003.00000002.904555277.0000000000FA1000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6148, type: MEMORY
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_004070F5 push esi; retf
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_0040894B push esp; retf
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_00404DC1 push es; retf
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_004053BC pushfd ; ret
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_022E005D pushad ; retf
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_022E016E push ss; ret
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_022E2542 push ecx; ret
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_022E1B5D push cs; retf
            Source: C:\Users\user\Desktop\faktura.exeCode function: 0_2_022E25F9 push ss; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_20510D7E push cs; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Users\user\Desktop\faktura.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA1E61 InternetOpenA,InternetOpenUrlA,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA1872 LoadLibraryA,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA3135
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E19DF second address: 00000000022E19DF instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1AB4 second address: 00000000022E1AB4 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FC25CB35468h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp edx, eax 0x0000001f pop ecx 0x00000020 add edi, edx 0x00000022 dec ecx 0x00000023 cmp ecx, 00000000h 0x00000026 jne 00007FC25CB35451h 0x00000028 push ecx 0x00000029 call 00007FC25CB3547Bh 0x0000002e call 00007FC25CB35478h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E323E second address: 00000000022E323E instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a inc ecx 0x0000000b inc ebx 0x0000000c test ax, bx 0x0000000f cmp dword ptr [ebx], 9090C350h 0x00000015 jne 00007FC25CB3547Ah 0x00000017 cmp edx, dword ptr [ebx] 0x00000019 jne 00007FC25CB3546Fh 0x0000001b cmp byte ptr [ebx], FFFFFFE8h 0x0000001e jne 00007FC25CB35495h 0x00000020 cmp byte ptr [ebx], FFFFFFB8h 0x00000023 jne 00007FC25CB35484h 0x00000025 cmp ecx, 00002000h 0x0000002b jne 00007FC25CB353BAh 0x00000031 pushad 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E329B second address: 00000000022E329B instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E2061 second address: 00000000022E2061 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E20E2 second address: 00000000022E20E2 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E215F second address: 00000000022E215F instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E21EA second address: 00000000022E21EA instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E2269 second address: 00000000022E2269 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E17DC second address: 00000000022E17DC instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1801 second address: 00000000022E1801 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1853 second address: 00000000022E1853 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E18F4 second address: 00000000022E18F4 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1944 second address: 00000000022E1944 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E174B second address: 00000000022E174B instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E178A second address: 00000000022E2BE5 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov eax, 00000539h 0x0000000f pushad 0x00000010 mov di, B712h 0x00000014 cmp di, B712h 0x00000019 jne 00007FC25C88A09Bh 0x0000001f popad 0x00000020 ret 0x00000021 cmp eax, 00000539h 0x00000026 je 00007FC25C888C66h 0x00000028 call 00007FC25C88998Ah 0x0000002d test ah, dh 0x0000002f test ch, dh 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 cmp ah, ah 0x00000037 push dword ptr [ebp+24h] 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 cmp ecx, ecx 0x00000042 push 00000000h 0x00000044 call 00007FC25C88A9FCh 0x00000049 test ah, bh 0x0000004b test cx, 8861h 0x00000050 mov ecx, dword ptr [ebp+1Ch] 0x00000053 mov edx, 321C9581h 0x00000058 call 00007FC25C8886FAh 0x0000005d push esi 0x0000005e push edx 0x0000005f push ecx 0x00000060 test edx, 8DD1A303h 0x00000066 cmp eax, 00000539h 0x0000006b jne 00007FC25C888CC8h 0x0000006d test dh, FFFFFFEBh 0x00000070 pushad 0x00000071 lfence 0x00000074 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000FA1F71 second address: 0000000000FA1F71 instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000FA1FE8 second address: 0000000000FA1FE8 instructions:
            Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFunction Chain: systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,memAlloc,threadDelayed,threadDelayed
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\faktura.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\faktura.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exe, 00000003.00000002.904555277.0000000000FA1000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEF9
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E19DF second address: 00000000022E19DF instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1AB4 second address: 00000000022E1AB4 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FC25CB35468h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp edx, eax 0x0000001f pop ecx 0x00000020 add edi, edx 0x00000022 dec ecx 0x00000023 cmp ecx, 00000000h 0x00000026 jne 00007FC25CB35451h 0x00000028 push ecx 0x00000029 call 00007FC25CB3547Bh 0x0000002e call 00007FC25CB35478h 0x00000033 lfence 0x00000036 mov edx, dword ptr [7FFE0014h] 0x0000003c lfence 0x0000003f ret 0x00000040 mov esi, edx 0x00000042 pushad 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1B6D second address: 00000000022E1B6D instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FC25C88A05Ch 0x0000001d popad 0x0000001e call 00007FC25C888C89h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E323E second address: 00000000022E323E instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a inc ecx 0x0000000b inc ebx 0x0000000c test ax, bx 0x0000000f cmp dword ptr [ebx], 9090C350h 0x00000015 jne 00007FC25CB3547Ah 0x00000017 cmp edx, dword ptr [ebx] 0x00000019 jne 00007FC25CB3546Fh 0x0000001b cmp byte ptr [ebx], FFFFFFE8h 0x0000001e jne 00007FC25CB35495h 0x00000020 cmp byte ptr [ebx], FFFFFFB8h 0x00000023 jne 00007FC25CB35484h 0x00000025 cmp ecx, 00002000h 0x0000002b jne 00007FC25CB353BAh 0x00000031 pushad 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E329B second address: 00000000022E329B instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E2D55 second address: 00000000022E2D55 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp ecx, 18h 0x0000000e jne 00007FC25CB35437h 0x00000010 test ch, ah 0x00000012 fnop 0x00000014 push dword ptr [eax+ecx] 0x00000017 pop dword ptr [ebx+ecx] 0x0000001a inc ecx 0x0000001b inc ecx 0x0000001c inc ecx 0x0000001d inc ecx 0x0000001e test edx, 39F97FE6h 0x00000024 test dh, FFFFFFE8h 0x00000027 pushad 0x00000028 lfence 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E2061 second address: 00000000022E2061 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E20E2 second address: 00000000022E20E2 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E215F second address: 00000000022E215F instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E21EA second address: 00000000022E21EA instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E2253 second address: 00000000022E2269 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 mov dword ptr [ebp+00000120h], eax 0x00000009 test ecx, ecx 0x0000000b test ah, ah 0x0000000d mov ecx, dword ptr [ebp+18h] 0x00000010 mov edx, 71019921h 0x00000015 pushad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E2269 second address: 00000000022E2269 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E17DC second address: 00000000022E17DC instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1801 second address: 00000000022E1801 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1853 second address: 00000000022E1853 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E18F4 second address: 00000000022E18F4 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E1944 second address: 00000000022E1944 instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E174B second address: 00000000022E174B instructions:
            Source: C:\Users\user\Desktop\faktura.exeRDTSC instruction interceptor: First address: 00000000022E178A second address: 00000000022E2BE5 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov eax, 00000539h 0x0000000f pushad 0x00000010 mov di, B712h 0x00000014 cmp di, B712h 0x00000019 jne 00007FC25C88A09Bh 0x0000001f popad 0x00000020 ret 0x00000021 cmp eax, 00000539h 0x00000026 je 00007FC25C888C66h 0x00000028 call 00007FC25C88998Ah 0x0000002d test ah, dh 0x0000002f test ch, dh 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 cmp ah, ah 0x00000037 push dword ptr [ebp+24h] 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 cmp ecx, ecx 0x00000042 push 00000000h 0x00000044 call 00007FC25C88A9FCh 0x00000049 test ah, bh 0x0000004b test cx, 8861h 0x00000050 mov ecx, dword ptr [ebp+1Ch] 0x00000053 mov edx, 321C9581h 0x00000058 call 00007FC25C8886FAh 0x0000005d push esi 0x0000005e push edx 0x0000005f push ecx 0x00000060 test edx, 8DD1A303h 0x00000066 cmp eax, 00000539h 0x0000006b jne 00007FC25C888CC8h 0x0000006d test dh, FFFFFFEBh 0x00000070 pushad 0x00000071 lfence 0x00000074 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000FA1B6D second address: 0000000000FA1B6D instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FC25CB3684Ch 0x0000001d popad 0x0000001e call 00007FC25CB35479h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000FA1F5C second address: 0000000000FA1F71 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 push eax 0x00000004 test ecx, ecx 0x00000006 push 00010000h 0x0000000b test ah, ah 0x0000000d push ebx 0x0000000e push dword ptr [ebp+000000ECh] 0x00000014 pushad 0x00000015 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000FA1F71 second address: 0000000000FA1F71 instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000FA1FE8 second address: 0000000000FA1FE8 instructions:
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA2BCE rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 584
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6860Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6860Thread sleep time: -17520000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6860Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 6860Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
            Source: RegAsm.exe, 00000003.00000002.904555277.0000000000FA1000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exef9
            Source: RegAsm.exe, 00000003.00000002.909289301.0000000020290000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: RegAsm.exe, 00000003.00000002.909289301.0000000020290000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: RegAsm.exe, 00000003.00000002.909289301.0000000020290000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: RegAsm.exe, 00000003.00000002.909289301.0000000020290000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\faktura.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\faktura.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA2BCE rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_1FEEF950 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA19C4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA2D79 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA2B62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA3135 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\faktura.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: FA0000
            Source: C:\Users\user\Desktop\faktura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\faktura.exe'
            Source: C:\Users\user\Desktop\faktura.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\faktura.exe'
            Source: RegAsm.exe, 00000003.00000002.904927890.0000000001760000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000003.00000002.904927890.0000000001760000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000003.00000002.904927890.0000000001760000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000003.00000002.904927890.0000000001760000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 3_2_00FA18E7 cpuid
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6148, type: MEMORY
            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Yara matchFile source: 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6148, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6148, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Access Token Manipulation1Disable or Modify Tools11OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection112Virtualization/Sandbox Evasion341Credentials in Registry1Security Software Discovery731Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Access Token Manipulation1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Local System2Automated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion341Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol112Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery424Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 385392 Sample: faktura.exe Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 24 Potential malicious icon found 2->24 26 Found malware configuration 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 5 other signatures 2->30 7 faktura.exe 2->7         started        process3 signatures4 32 Writes to foreign memory regions 7->32 34 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 7->34 36 Tries to detect Any.run 7->36 38 2 other signatures 7->38 10 RegAsm.exe 11 7->10         started        14 RegAsm.exe 7->14         started        process5 dnsIp6 18 felgui.pt 185.31.158.175, 49773, 587 ONILisbonPortugalPT Portugal 10->18 20 mail.felgui.pt 10->20 22 2 other IPs or domains 10->22 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->40 42 Tries to steal Mail credentials (via file access) 10->42 44 Tries to harvest and steal ftp login credentials 10->44 52 3 other signatures 10->52 16 conhost.exe 10->16         started        46 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->46 48 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->48 50 Contains functionality to detect hardware virtualization (CPUID execution measurement) 14->50 54 3 other signatures 14->54 signatures7 process8

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            faktura.exe32%VirustotalBrowse

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            felgui.pt0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            https://kij0jMdbT7S0DxfQ.net0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://HgEvCf.com0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            felgui.pt
            185.31.158.175
            truetrueunknown
            googlehosted.l.googleusercontent.com
            216.58.215.225
            truefalse
              high
              mail.felgui.pt
              unknown
              unknowntrue
                unknown
                doc-0o-7c-docs.googleusercontent.com
                unknown
                unknownfalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  https://kij0jMdbT7S0DxfQ.nettrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://DynDns.comDynDNSRegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://HgEvCf.comRegAsm.exe, 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  216.58.215.225
                  googlehosted.l.googleusercontent.comUnited States
                  15169GOOGLEUSfalse
                  185.31.158.175
                  felgui.ptPortugal
                  9186ONILisbonPortugalPTtrue

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:385392
                  Start date:12.04.2021
                  Start time:12:31:11
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 5m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:faktura.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:18
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.evad.winEXE@6/1@2/2
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 41.1% (good quality ratio 13.6%)
                  • Quality average: 16.5%
                  • Quality standard deviation: 26.4%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 52.113.196.254, 13.107.3.254, 13.107.246.254, 13.64.90.137, 104.43.139.144, 216.58.215.238, 20.82.209.183, 92.122.213.194, 92.122.213.247, 104.43.193.48, 104.42.151.234, 52.155.217.156, 20.54.26.129, 2.20.142.209, 2.20.142.210, 20.82.210.154
                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, s-ring.msedge.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, teams-9999.teams-msedge.net, audownload.windowsupdate.nsatc.net, drive.google.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, s-ring.s-9999.s-msedge.net, t-ring.msedge.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, t-9999.t-msedge.net, s-9999.s-msedge.net, blobcollector.events.data.trafficmanager.net, teams-ring.teams-9999.teams-msedge.net, teams-ring.msedge.net, t-ring.t-9999.t-msedge.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  12:32:22API Interceptor855x Sleep call for process: RegAsm.exe modified

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  ONILisbonPortugalPTOrderlist_267409.pdf.exeGet hashmaliciousBrowse
                  • 185.90.59.42
                  PO_ 09162020.docGet hashmaliciousBrowse
                  • 185.90.59.243
                  https://demo.nrnow.pt/wp-content/themes/image/home.phpGet hashmaliciousBrowse
                  • 185.90.56.28
                  CWRO20-09.docGet hashmaliciousBrowse
                  • 185.90.59.243
                  #U5909#U53162020.09.docGet hashmaliciousBrowse
                  • 185.90.59.243
                  EQVNPU20.09.docGet hashmaliciousBrowse
                  • 185.90.59.243
                  0601_pdf.exeGet hashmaliciousBrowse
                  • 185.90.59.42
                  Clasquin France SARL - Demande client 001259 - SKBMT-07-29-2020-115-img00273.exeGet hashmaliciousBrowse
                  • 185.90.56.35
                  https://boavistawindows.comGet hashmaliciousBrowse
                  • 5.253.181.163
                  http://www.thevisionaire.net/Invoice-31882146/Get hashmaliciousBrowse
                  • 213.58.147.102
                  refugee.docGet hashmaliciousBrowse
                  • 213.58.147.102
                  refugee.docGet hashmaliciousBrowse
                  • 213.58.147.102

                  JA3 Fingerprints

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  37f463bf4616ecd445d4a1937da06e19PaymentCopy.vbsGet hashmaliciousBrowse
                  • 216.58.215.225
                  PO NUMBER 3120386 3120393 SIGNED.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  RemitSwift119353 xlsx.htmGet hashmaliciousBrowse
                  • 216.58.215.225
                  os9TZxfmTZ.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  SWIFT Payment Advise 39 430-25.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  malevolo.ps1Get hashmaliciousBrowse
                  • 216.58.215.225
                  shipping document.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  Statement-ID261179932209970.vbsGet hashmaliciousBrowse
                  • 216.58.215.225
                  Alexandra38.docxGet hashmaliciousBrowse
                  • 216.58.215.225
                  rRobw1VVRP.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  Tmd7W7qwQw.dllGet hashmaliciousBrowse
                  • 216.58.215.225
                  SecuriteInfo.com.Trojan.Agent.FFIJ.17175.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  documents-351331057.xlsmGet hashmaliciousBrowse
                  • 216.58.215.225
                  documents-1819557117.xlsmGet hashmaliciousBrowse
                  • 216.58.215.225
                  mail_6512365134_7863_202104108.htmlGet hashmaliciousBrowse
                  • 216.58.215.225
                  Copia bancaria de swift.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  SecuriteInfo.com.Trojan.GenericKD.36659493.29456.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  SecuriteInfo.com.Trojan.Siggen12.64197.30705.exeGet hashmaliciousBrowse
                  • 216.58.215.225
                  #Ud83d#Udcde973.htmGet hashmaliciousBrowse
                  • 216.58.215.225

                  Dropped Files

                  No context

                  Created / dropped Files

                  \Device\ConDrv
                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):30
                  Entropy (8bit):3.964735178725505
                  Encrypted:false
                  SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                  MD5:9F754B47B351EF0FC32527B541420595
                  SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                  SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                  SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: NordVPN directory not found!..

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.712007953970682
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.15%
                  • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:faktura.exe
                  File size:86016
                  MD5:4a4501e0665974a9aee852ea13e6e7f6
                  SHA1:200399b39a95fa717ccd64e51c7b5515e4b1a3a7
                  SHA256:cb4b104a48fd8927dd979c9f7381707470432540161a2be6e1eabcee470020b8
                  SHA512:156185f13b31304e76d486b3bad4b8e43cbae4261b96b1996d8301bdf68de6b3353f8c67dc1fdae0c84fa7100be13469bc833de906e9688e9861d475d79bdf80
                  SSDEEP:1536:6vUULwK+YaTMDDeDTw4F6qPRE08raVX5siZQz9:vULbaTMDiDTVZjy
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L.....t`................. ...0...............0....@................

                  File Icon

                  Icon Hash:20047c7c70f0e004

                  Static PE Info

                  General

                  Entrypoint:0x4015b8
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  DLL Characteristics:
                  Time Stamp:0x60741610 [Mon Apr 12 09:42:40 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:4ba170b6a3de0ed01456bc01eac94f5d

                  Entrypoint Preview

                  Instruction
                  push 004017A8h
                  call 00007FC25CDE3F43h
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  xor byte ptr [eax], al
                  add byte ptr [eax], al
                  inc eax
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [esi+21B10C5Eh], al
                  pushad
                  mov ecx, 77AF8E44h
                  in eax, dx
                  cld
                  dec esi
                  test byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [ecx], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], ch
                  pop edi
                  sbb byte ptr [ebx], al
                  push edx
                  push ebp
                  dec esi
                  inc esp
                  push esp
                  push ebp
                  push edx
                  inc ebp
                  add byte ptr [eax], cl
                  inc ecx
                  add byte ptr [eax], ah
                  or byte ptr [ecx+00h], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  dec esp
                  xor dword ptr [eax], eax
                  add eax, E72DE951h
                  js 00007FC25CDE3EE5h
                  lds eax, fword ptr [ebx-75h]
                  jl 00007FC25CDE3EF4h
                  call 00007FC203D81EA9h
                  lahf
                  dec eax
                  push edi
                  loopne 00007FC25CDE3EF3h
                  scasb
                  inc edx
                  xchg eax, esi
                  add dword ptr [edx+ebx*2-39h], ebx
                  cmp ebx, dword ptr [ebx+6Fh]
                  cmp cl, byte ptr [edi-53h]
                  xor ebx, dword ptr [ecx-48EE309Ah]
                  or al, 00h
                  stosb
                  add byte ptr [eax-2Dh], ah
                  xchg eax, ebx
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  inc esp
                  add dword ptr [eax], eax
                  add byte ptr [ebx+00h], bl
                  add byte ptr [eax], al
                  add byte ptr [41454700h], al
                  push edx
                  push ebx
                  add byte ptr [46001401h], cl
                  push 0000006Ch
                  jc 00007FC25CDE3FB7h
                  je 00007FC25CDE3FB3h
                  bound ebp, dword ptr [eax+eax+00h]

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x126b40x28.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x90c.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x11d340x12000False0.45270453559data6.23295630947IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .data0x130000x12e80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .rsrc0x150000x90c0x1000False0.168701171875data1.97869504775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x157dc0x130data
                  RT_ICON0x154f40x2e8data
                  RT_ICON0x153cc0x128GLS_BINARY_LSB_FIRST
                  RT_GROUP_ICON0x1539c0x30data
                  RT_VERSION0x151500x24cdataChineseTaiwan

                  Imports

                  DLLImport
                  MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaSetSystemError, __vbaRecDestruct, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaCyStr, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, _CIlog, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, __vbaRecDestructAnsi, _CIatan, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                  Version Infos

                  DescriptionData
                  Translation0x0404 0x04b0
                  InternalNamelnoverfrslers
                  FileVersion1.00
                  CompanyNamePixar
                  ProductNamePixar
                  ProductVersion1.00
                  FileDescriptionPixar
                  OriginalFilenamelnoverfrslers.exe

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  ChineseTaiwan

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Apr 12, 2021 12:32:15.428812981 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.475714922 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.475919008 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.477658033 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.524838924 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.538342953 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.538431883 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.538475990 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.538479090 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.538513899 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.538573980 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.538661003 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.557836056 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.603912115 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.604077101 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.606158018 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.656802893 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.870677948 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.870723963 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.870759010 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.870798111 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.870835066 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.870857000 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.870887041 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.870985985 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.874026060 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.874059916 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.874135971 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.874221087 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.877454996 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.877489090 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.877572060 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.877629042 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.880759954 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.880808115 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.880873919 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.880923033 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.884094000 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.884135008 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.884222031 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.884264946 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.886877060 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.886918068 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.887021065 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.887075901 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.916469097 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.916526079 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.916574001 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.916609049 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.918062925 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.918106079 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.918311119 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.921478033 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.921519041 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.921610117 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.921653032 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.924873114 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.924913883 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.924974918 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.925035954 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.928263903 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.928308964 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.928371906 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.928411961 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.931653976 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.931699991 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.931754112 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.931796074 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.935044050 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.935087919 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.935211897 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.935323954 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.938543081 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.938591003 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.938632011 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.938676119 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.941643953 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.941692114 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.944766998 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.944813013 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.947479963 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.947531939 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.949839115 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.951750040 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.951780081 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.951850891 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.951878071 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.954535961 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.954562902 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.954689026 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.956168890 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.956199884 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.956302881 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.958982944 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.959080935 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.959095955 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.959163904 CEST49742443192.168.2.4216.58.215.225
                  Apr 12, 2021 12:32:15.962201118 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.962245941 CEST44349742216.58.215.225192.168.2.4
                  Apr 12, 2021 12:32:15.962346077 CEST49742443192.168.2.4216.58.215.225

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Apr 12, 2021 12:31:48.197839022 CEST5802853192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:48.247685909 CEST53580288.8.8.8192.168.2.4
                  Apr 12, 2021 12:31:48.521337986 CEST5309753192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:48.570025921 CEST53530978.8.8.8192.168.2.4
                  Apr 12, 2021 12:31:48.738893032 CEST4925753192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:48.787513971 CEST53492578.8.8.8192.168.2.4
                  Apr 12, 2021 12:31:54.372689009 CEST6238953192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:54.422895908 CEST53623898.8.8.8192.168.2.4
                  Apr 12, 2021 12:31:55.477492094 CEST4991053192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:55.529230118 CEST53499108.8.8.8192.168.2.4
                  Apr 12, 2021 12:31:56.647651911 CEST5585453192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:56.709515095 CEST53558548.8.8.8192.168.2.4
                  Apr 12, 2021 12:31:57.860956907 CEST6454953192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:57.911808968 CEST53645498.8.8.8192.168.2.4
                  Apr 12, 2021 12:31:58.980928898 CEST6315353192.168.2.48.8.8.8
                  Apr 12, 2021 12:31:59.037889957 CEST53631538.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:00.471754074 CEST5299153192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:00.532522917 CEST53529918.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:01.508951902 CEST5370053192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:01.557921886 CEST53537008.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:03.459892988 CEST5172653192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:03.513540983 CEST53517268.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:05.327303886 CEST5679453192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:05.384478092 CEST53567948.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:07.583515882 CEST5653453192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:07.632533073 CEST53565348.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:08.685651064 CEST5662753192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:08.738821030 CEST53566278.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:09.854979992 CEST5662153192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:09.903726101 CEST53566218.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:14.041749001 CEST6311653192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:14.098901033 CEST53631168.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:14.224805117 CEST6407853192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:14.289911985 CEST53640788.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:15.361759901 CEST6480153192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:15.410377026 CEST6172153192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:15.426651001 CEST53648018.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:15.459176064 CEST53617218.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:18.012386084 CEST5125553192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:18.064095020 CEST53512558.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:24.734566927 CEST6152253192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:24.795698881 CEST53615228.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:31.120017052 CEST5233753192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:31.170082092 CEST53523378.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:32.186961889 CEST5504653192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:32.246851921 CEST53550468.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:35.226739883 CEST4961253192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:35.276806116 CEST53496128.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:36.511339903 CEST4928553192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:36.564383984 CEST53492858.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:37.576410055 CEST5060153192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:37.695224047 CEST53506018.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:38.229449034 CEST6087553192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:38.289577007 CEST53608758.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:38.720961094 CEST5644853192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:38.793565989 CEST53564488.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:38.850287914 CEST5917253192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:38.998446941 CEST53591728.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:39.472543955 CEST6242053192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:39.532144070 CEST53624208.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:40.102365017 CEST6057953192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:40.160980940 CEST53605798.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:40.685070992 CEST5018353192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:40.768840075 CEST53501838.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:41.344455004 CEST6153153192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:41.470510960 CEST53615318.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:42.314495087 CEST4922853192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:42.364402056 CEST53492288.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:43.230549097 CEST5979453192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:43.289160967 CEST53597948.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:43.710417986 CEST5591653192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:43.782314062 CEST53559168.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:43.841063023 CEST5275253192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:43.912854910 CEST53527528.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:53.730091095 CEST6054253192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:53.783735037 CEST53605428.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:53.892374039 CEST6068953192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:53.962152958 CEST53606898.8.8.8192.168.2.4
                  Apr 12, 2021 12:32:56.057111979 CEST6420653192.168.2.48.8.8.8
                  Apr 12, 2021 12:32:56.118586063 CEST53642068.8.8.8192.168.2.4
                  Apr 12, 2021 12:33:28.757922888 CEST5090453192.168.2.48.8.8.8
                  Apr 12, 2021 12:33:28.806732893 CEST53509048.8.8.8192.168.2.4
                  Apr 12, 2021 12:33:30.481461048 CEST5752553192.168.2.48.8.8.8
                  Apr 12, 2021 12:33:30.546253920 CEST53575258.8.8.8192.168.2.4
                  Apr 12, 2021 12:33:44.203052998 CEST5381453192.168.2.48.8.8.8
                  Apr 12, 2021 12:33:44.354367971 CEST53538148.8.8.8192.168.2.4

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Apr 12, 2021 12:32:15.361759901 CEST192.168.2.48.8.8.80x31f0Standard query (0)doc-0o-7c-docs.googleusercontent.comA (IP address)IN (0x0001)
                  Apr 12, 2021 12:33:44.203052998 CEST192.168.2.48.8.8.80x1826Standard query (0)mail.felgui.ptA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Apr 12, 2021 12:32:15.426651001 CEST8.8.8.8192.168.2.40x31f0No error (0)doc-0o-7c-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                  Apr 12, 2021 12:32:15.426651001 CEST8.8.8.8192.168.2.40x31f0No error (0)googlehosted.l.googleusercontent.com216.58.215.225A (IP address)IN (0x0001)
                  Apr 12, 2021 12:33:44.354367971 CEST8.8.8.8192.168.2.40x1826No error (0)mail.felgui.ptfelgui.ptCNAME (Canonical name)IN (0x0001)
                  Apr 12, 2021 12:33:44.354367971 CEST8.8.8.8192.168.2.40x1826No error (0)felgui.pt185.31.158.175A (IP address)IN (0x0001)

                  HTTPS Packets

                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                  Apr 12, 2021 12:32:15.538513899 CEST216.58.215.225443192.168.2.449742CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Mar 16 20:32:57 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Jun 08 21:32:56 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                  CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                  SMTP Packets

                  TimestampSource PortDest PortSource IPDest IPCommands
                  Apr 12, 2021 12:33:44.695185900 CEST58749773185.31.158.175192.168.2.4220-servidor3.scpdpi.pt ESMTP Exim 4.94 #2 Mon, 12 Apr 2021 11:33:44 +0100
                  220-We do not authorize the use of this system to transport unsolicited,
                  220 and/or bulk e-mail.
                  Apr 12, 2021 12:33:44.695745945 CEST49773587192.168.2.4185.31.158.175EHLO 715575
                  Apr 12, 2021 12:33:44.792510986 CEST58749773185.31.158.175192.168.2.4250-servidor3.scpdpi.pt Hello 715575 [84.17.52.3]
                  250-SIZE 52428800
                  250-8BITMIME
                  250-PIPELINING
                  250-X_PIPE_CONNECT
                  250-STARTTLS
                  250 HELP
                  Apr 12, 2021 12:33:44.793549061 CEST58749773185.31.158.175192.168.2.4421 servidor3.scpdpi.pt lost input connection

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:12:31:55
                  Start date:12/04/2021
                  Path:C:\Users\user\Desktop\faktura.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\faktura.exe'
                  Imagebase:0x400000
                  File size:86016 bytes
                  MD5 hash:4A4501E0665974A9AEE852EA13E6E7F6
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:Visual Basic
                  Reputation:low

                  General

                  Start time:12:32:03
                  Start date:12/04/2021
                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                  Wow64 process (32bit):false
                  Commandline:'C:\Users\user\Desktop\faktura.exe'
                  Imagebase:0x310000
                  File size:53248 bytes
                  MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:12:32:03
                  Start date:12/04/2021
                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\faktura.exe'
                  Imagebase:0xbd0000
                  File size:53248 bytes
                  MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000003.00000002.904555277.0000000000FA1000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.908261249.000000001DCC1000.00000004.00000001.sdmp, Author: Joe Security
                  Reputation:high

                  General

                  Start time:12:32:04
                  Start date:12/04/2021
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff724c50000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >