Loading ...

Play interactive tourEdit tour

Analysis Report xVvAobZvWU

Overview

General Information

Sample Name:xVvAobZvWU (renamed file extension from none to exe)
Analysis ID:385394
MD5:b415645d1b8039996726b424cd53a81c
SHA1:cfcc4ee2d2e00ae4deb8591e7b8682d6946db5f5
SHA256:806bf1c6fa713325b45642893ede4dcb76dbf6044aea80a5315da1075cc25b9a
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • xVvAobZvWU.exe (PID: 5504 cmdline: 'C:\Users\user\Desktop\xVvAobZvWU.exe' MD5: B415645D1B8039996726B424CD53A81C)
    • xVvAobZvWU.exe (PID: 2584 cmdline: {path} MD5: B415645D1B8039996726B424CD53A81C)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "jaen@brimaq.combrimaQ2012mail.brimaq.commetoyou2411@gmail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: xVvAobZvWU.exe PID: 2584JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 3 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.xVvAobZvWU.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.xVvAobZvWU.exe.39b33b0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.xVvAobZvWU.exe.39b33b0.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                  Sigma Overview

                  No Sigma rule has matched

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "jaen@brimaq.combrimaQ2012mail.brimaq.commetoyou2411@gmail.com"}
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: xVvAobZvWU.exeVirustotal: Detection: 30%Perma Link
                  Source: xVvAobZvWU.exeReversingLabs: Detection: 10%
                  Machine Learning detection for sampleShow sources
                  Source: xVvAobZvWU.exeJoe Sandbox ML: detected
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: xVvAobZvWU.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  Source: xVvAobZvWU.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: global trafficTCP traffic: 192.168.2.3:49741 -> 78.128.8.31:587
                  Source: Joe Sandbox ViewASN Name: TELEPOINTBG TELEPOINTBG
                  Source: global trafficTCP traffic: 192.168.2.3:49741 -> 78.128.8.31:587
                  Source: unknownDNS traffic detected: queries for: mail.brimaq.com
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://Bavw5lBQkDhG9.net
                  Source: xVvAobZvWU.exe, 00000002.00000003.401682628.0000000001094000.00000004.00000001.sdmpString found in binary or memory: http://Bavw5lBQkDhG9.net1-5-21-3853321935-2125563209-4053062332-1002_Classes
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://UfeDnz.com
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                  Source: xVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpString found in binary or memory: http://brimaq.com
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                  Source: xVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpString found in binary or memory: http://mail.brimaq.com
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                  Source: xVvAobZvWU.exe, 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, xVvAobZvWU.exe, 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                  System Summary:

                  barindex
                  .NET source code contains very large array initializationsShow sources
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b5BCBD15Au002dC8BBu002d4A4Au002dB998u002d7E02CCE826D7u007d/C91E5AB2u002dAB1Au002d4634u002dBC6Fu002dDBEDDDE764F7.csLarge array initialization: .cctor: array initializer size 11945
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_003A9245
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_00D6C164
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_00D6E5B0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_00D6E5A0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_003A929D
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_00A59245
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01122A98
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01124418
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01122367
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01126D30
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116F8EC
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011603C5
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116F3C0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116BBCC
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01165E38
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116A2C0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01167228
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01169660
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011754C0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0117B748
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01176BE0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01174C30
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_00A5929D
                  Source: xVvAobZvWU.exe, 00000000.00000002.202359814.0000000004D80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000000.192493663.0000000000448000.00000002.00020000.sdmpBinary or memory string: OriginalFilename2A vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000002.202558284.0000000004DF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMKxlRmnrxoJfDTOrHckujWdZgfyhUUAQDs.exe4 vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000002.203440932.0000000005941000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463074346.00000000010A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.461233349.0000000000AF8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename2A vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameMKxlRmnrxoJfDTOrHckujWdZgfyhUUAQDs.exe4 vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463491577.00000000011DA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463236763.0000000001130000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.461362348.0000000000EF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463261981.0000000001140000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exeBinary or memory string: OriginalFilename2A vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  Source: xVvAobZvWU.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xVvAobZvWU.exe.logJump to behavior
                  Source: xVvAobZvWU.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: xVvAobZvWU.exeVirustotal: Detection: 30%
                  Source: xVvAobZvWU.exeReversingLabs: Detection: 10%
                  Source: unknownProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe 'C:\Users\user\Desktop\xVvAobZvWU.exe'
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe {path}
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe {path}
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: xVvAobZvWU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: xVvAobZvWU.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: xVvAobZvWU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: xVvAobZvWU.exeStatic PE information: 0x94712C9A [Tue Dec 1 14:15:54 2048 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8881862753
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Yara detected AntiVM3Show sources
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 5504, type: MEMORY
                  Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWindow / User API: threadDelayed 2149
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWindow / User API: threadDelayed 7696
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5440Thread sleep time: -31500s >= -30000s
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5684Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 6112Thread sleep time: -23058430092136925s >= -30000s
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5824Thread sleep count: 2149 > 30
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5824Thread sleep count: 7696 > 30
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 31500
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: vmware
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMWARE
                  Source: xVvAobZvWU.exe, 00000002.00000002.463620670.0000000001249000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01122A98 LdrInitializeThunk,
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeMemory allocated: page read and write | page guard
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe {path}
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Users\user\Desktop\xVvAobZvWU.exe VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Users\user\Desktop\xVvAobZvWU.exe VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 2584, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 5504, type: MEMORY
                  Source: Yara matchFile source: 2.2.xVvAobZvWU.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.raw.unpack, type: UNPACKEDPE
                  Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Tries to harvest and steal ftp login credentialsShow sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                  Tries to steal Mail credentials (via file access)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: Yara matchFile source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 2584, type: MEMORY

                  Remote Access Functionality:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 2584, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 5504, type: MEMORY
                  Source: Yara matchFile source: 2.2.xVvAobZvWU.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.raw.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection12Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Credentials in Registry1Security Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobTimestomp1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                  Behavior Graph

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  xVvAobZvWU.exe30%VirustotalBrowse
                  xVvAobZvWU.exe10%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  xVvAobZvWU.exe100%Joe Sandbox ML

                  Dropped Files

                  No Antivirus matches

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  2.2.xVvAobZvWU.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                  Domains

                  SourceDetectionScannerLabelLink
                  brimaq.com0%VirustotalBrowse
                  mail.brimaq.com1%VirustotalBrowse

                  URLs

                  SourceDetectionScannerLabelLink
                  http://UfeDnz.com0%Avira URL Cloudsafe
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://Bavw5lBQkDhG9.net1-5-21-3853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://Bavw5lBQkDhG9.net0%Avira URL Cloudsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  http://brimaq.com0%Avira URL Cloudsafe
                  http://mail.brimaq.com0%Avira URL Cloudsafe
                  http://r3.o.lencr.org00%URL Reputationsafe
                  http://r3.o.lencr.org00%URL Reputationsafe
                  http://r3.o.lencr.org00%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                  http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                  http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  brimaq.com
                  78.128.8.31
                  truetrueunknown
                  mail.brimaq.com
                  unknown
                  unknowntrueunknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://UfeDnz.comxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://127.0.0.1:HTTP/1.1xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://Bavw5lBQkDhG9.net1-5-21-3853321935-2125563209-4053062332-1002_ClassesxVvAobZvWU.exe, 00000002.00000003.401682628.0000000001094000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://DynDns.comDynDNSxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://Bavw5lBQkDhG9.netxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://cps.letsencrypt.org0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://brimaq.comxVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://mail.brimaq.comxVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://r3.o.lencr.org0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipxVvAobZvWU.exe, 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, xVvAobZvWU.exe, 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://cps.root-x1.letsencrypt.org0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://r3.i.lencr.org/0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  78.128.8.31
                  brimaq.comBulgaria
                  31083TELEPOINTBGtrue

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:385394
                  Start date:12.04.2021
                  Start time:12:44:14
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 32s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:xVvAobZvWU (renamed file extension from none to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:25
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 0.1% (good quality ratio 0%)
                  • Quality average: 45%
                  • Quality standard deviation: 39.5%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 13.64.90.137, 104.43.139.144, 52.147.198.201, 20.82.210.154, 52.255.188.83, 92.122.144.200, 92.122.213.247, 92.122.213.194, 20.54.26.129
                  • Excluded domains from analysis (whitelisted): www.bing.com, skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, dual-a-0001.dc-msedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  12:44:57API Interceptor838x Sleep call for process: xVvAobZvWU.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  78.128.8.31FAKTURA I RACHUNKI.exeGet hashmaliciousBrowse

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    TELEPOINTBGFAKTURA I RACHUNKI.exeGet hashmaliciousBrowse
                    • 78.128.8.31
                    0AX4532QWSA.xlsxGet hashmaliciousBrowse
                    • 217.174.152.38
                    INV8222874744_20210111490395.xlsmGet hashmaliciousBrowse
                    • 217.174.149.3
                    spetsifikatsiya.xlsGet hashmaliciousBrowse
                    • 79.124.76.20
                    spetsifikatsiya.xlsGet hashmaliciousBrowse
                    • 79.124.76.20
                    document-1932597637.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1932597637.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1961450761.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909441643.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1961450761.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909441643.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1942925331.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1942925331.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1892683183.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1892683183.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909894964.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909894964.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1965918496.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1965918496.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1901557343.xlsGet hashmaliciousBrowse
                    • 217.174.152.52

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xVvAobZvWU.exe.log
                    Process:C:\Users\user\Desktop\xVvAobZvWU.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1216
                    Entropy (8bit):5.355304211458859
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.881411013396599
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:xVvAobZvWU.exe
                    File size:678400
                    MD5:b415645d1b8039996726b424cd53a81c
                    SHA1:cfcc4ee2d2e00ae4deb8591e7b8682d6946db5f5
                    SHA256:806bf1c6fa713325b45642893ede4dcb76dbf6044aea80a5315da1075cc25b9a
                    SHA512:a3d6f1444a13842e56e7aada5fcaf323058718fc564b9699956316afc1563f2b426e13b7f556fd4cd6de1ac6eef98e7fdebd05bdaecf986291bde742cb939c37
                    SSDEEP:12288:j0yZ00LCYKcGRcbLtD7TJrQrfVpo67st01Q5WMMe1zr6FEg848vDEpW:JZpCYKcGabvWXuoMMedr6F1zU
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....,q...............0..P...........n... ........@.. ....................................@................................

                    File Icon

                    Icon Hash:00828e8e8686b000

                    Static PE Info

                    General

                    Entrypoint:0x4a6ed2
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x94712C9A [Tue Dec 1 14:15:54 2048 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v4.0.30319
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa6e800x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x5f8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xa6e640x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xa4ed80xa5000False0.90078272964data7.8881862753IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rsrc0xa80000x5f80x600False0.438802083333data4.24177120131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xaa0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_VERSION0xa80900x366data
                    RT_MANIFEST0xa84080x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightCopyright Integra Wealth
                    Assembly Version1.8.9.10
                    InternalName2i.exe
                    FileVersion1.9.1.0
                    CompanyNameIntegra Wealth
                    LegalTrademarks
                    Comments
                    ProductNameReplacementFallback
                    ProductVersion1.9.1.0
                    FileDescriptionReplacementFallback
                    OriginalFilename2i.exe

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 12, 2021 12:46:38.869477987 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:38.946281910 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:38.946373940 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.163911104 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.164525986 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.243127108 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.243381023 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.323828936 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.378572941 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.385159016 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.473922014 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.473978996 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.474025965 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.474138021 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.485213995 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.564122915 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.613044977 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.850397110 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.928841114 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.932363033 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.011511087 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.016185045 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.115988970 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.117352962 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.194215059 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.194924116 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.311352968 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.351804972 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.352585077 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.429482937 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.435127974 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.435487032 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.435702085 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.435915947 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.512160063 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.512242079 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.512346983 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.512382984 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.543119907 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.597439051 CEST49741587192.168.2.378.128.8.31

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 12, 2021 12:44:50.612360954 CEST5062053192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:50.669533014 CEST53506208.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:51.245843887 CEST6493853192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:51.297452927 CEST53649388.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:52.431533098 CEST6015253192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:52.481501102 CEST53601528.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:53.900589943 CEST5754453192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:53.949954987 CEST53575448.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:57.193084955 CEST5598453192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:57.241938114 CEST53559848.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:58.087940931 CEST6418553192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:58.141357899 CEST53641858.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:59.118503094 CEST6511053192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:59.175698042 CEST53651108.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:00.035691023 CEST5836153192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:00.086199045 CEST53583618.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:01.092727900 CEST6349253192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:01.141478062 CEST53634928.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:01.867960930 CEST6083153192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:01.916639090 CEST53608318.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:03.007688046 CEST6010053192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:03.059261084 CEST53601008.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:03.925549984 CEST5319553192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:03.974323988 CEST53531958.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:06.181027889 CEST5014153192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:06.234987974 CEST53501418.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:07.642683983 CEST5302353192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:07.691351891 CEST53530238.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:24.676044941 CEST4956353192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:24.728600979 CEST53495638.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:26.453423977 CEST5135253192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:26.505266905 CEST53513528.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:27.536922932 CEST5934953192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:27.585517883 CEST53593498.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:31.249435902 CEST5708453192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:31.322732925 CEST53570848.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:36.898156881 CEST5882353192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:36.956593990 CEST53588238.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:45.408162117 CEST5756853192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:45.474838018 CEST53575688.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:47.998008013 CEST5054053192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:48.047997952 CEST53505408.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:52.693586111 CEST5436653192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:52.742301941 CEST53543668.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:56.675220966 CEST5303453192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:56.726906061 CEST53530348.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:59.935096025 CEST5776253192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:59.986671925 CEST53577628.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:02.939059019 CEST5543553192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:03.000535965 CEST53554358.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:34.890126944 CEST5071353192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:34.941271067 CEST53507138.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:37.076522112 CEST5613253192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:37.137068987 CEST53561328.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:38.585671902 CEST5898753192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:38.683134079 CEST53589878.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:38.718928099 CEST5657953192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:38.780081034 CEST53565798.8.8.8192.168.2.3

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Apr 12, 2021 12:46:38.585671902 CEST192.168.2.38.8.8.80xd703Standard query (0)mail.brimaq.comA (IP address)IN (0x0001)
                    Apr 12, 2021 12:46:38.718928099 CEST192.168.2.38.8.8.80xae83Standard query (0)mail.brimaq.comA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Apr 12, 2021 12:46:38.683134079 CEST8.8.8.8192.168.2.30xd703No error (0)mail.brimaq.combrimaq.comCNAME (Canonical name)IN (0x0001)
                    Apr 12, 2021 12:46:38.683134079 CEST8.8.8.8192.168.2.30xd703No error (0)brimaq.com78.128.8.31A (IP address)IN (0x0001)
                    Apr 12, 2021 12:46:38.780081034 CEST8.8.8.8192.168.2.30xae83No error (0)mail.brimaq.combrimaq.comCNAME (Canonical name)IN (0x0001)
                    Apr 12, 2021 12:46:38.780081034 CEST8.8.8.8192.168.2.30xae83No error (0)brimaq.com78.128.8.31A (IP address)IN (0x0001)

                    SMTP Packets

                    TimestampSource PortDest PortSource IPDest IPCommands
                    Apr 12, 2021 12:46:39.163911104 CEST5874974178.128.8.31192.168.2.3220-srvr.laprimeracloud08.com ESMTP Exim 4.94 #2 Mon, 12 Apr 2021 12:46:39 +0200
                    220-We do not authorize the use of this system to transport unsolicited,
                    220 and/or bulk e-mail.
                    Apr 12, 2021 12:46:39.164525986 CEST49741587192.168.2.378.128.8.31EHLO 818225
                    Apr 12, 2021 12:46:39.243127108 CEST5874974178.128.8.31192.168.2.3250-srvr.laprimeracloud08.com Hello 818225 [84.17.52.3]
                    250-SIZE 52428800
                    250-8BITMIME
                    250-PIPELINING
                    250-X_PIPE_CONNECT
                    250-AUTH PLAIN LOGIN
                    250-STARTTLS
                    250 HELP
                    Apr 12, 2021 12:46:39.243381023 CEST49741587192.168.2.378.128.8.31STARTTLS
                    Apr 12, 2021 12:46:39.323828936 CEST5874974178.128.8.31192.168.2.3220 TLS go ahead

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:12:44:56
                    Start date:12/04/2021
                    Path:C:\Users\user\Desktop\xVvAobZvWU.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\xVvAobZvWU.exe'
                    Imagebase:0x3a0000
                    File size:678400 bytes
                    MD5 hash:B415645D1B8039996726B424CD53A81C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, Author: Joe Security
                    Reputation:low

                    General

                    Start time:12:44:59
                    Start date:12/04/2021
                    Path:C:\Users\user\Desktop\xVvAobZvWU.exe
                    Wow64 process (32bit):true
                    Commandline:{path}
                    Imagebase:0xa50000
                    File size:678400 bytes
                    MD5 hash:B415645D1B8039996726B424CD53A81C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, Author: Joe Security
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >