Loading ...

Play interactive tourEdit tour

Analysis Report faktura_POfk.exe

Overview

General Information

Sample Name:faktura_POfk.exe
Analysis ID:392258
MD5:afc152f879700d92a9eefa03f5e455b9
SHA1:cf18af51aefaa2589a4a016ed6dfeba9f55737cc
SHA256:389faf1c0ff21042f461a7780ada634cd612b8cf4876b3ed41a98e31c246858c
Tags:GuLoader
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Sigma detected: RegAsm connects to smtp port
Yara detected AgentTesla
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • faktura_POfk.exe (PID: 256 cmdline: 'C:\Users\user\Desktop\faktura_POfk.exe' MD5: AFC152F879700D92A9EEFA03F5E455B9)
    • RegAsm.exe (PID: 4364 cmdline: 'C:\Users\user\Desktop\faktura_POfk.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 3704 cmdline: 'C:\Users\user\Desktop\faktura_POfk.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 1092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=163Z2wAbbuss9WV_lMGQhSMyvIRqk02oq", "Injection Process": ["RegAsm.exe", "RegSvcs.exe", "MSBuild.exe"]}

Threatname: Agenttesla

{"Username: ": "Kz6StgI", "URL: ": "https://kgxZr9SNdkYE806O36R.com", "To: ": "paulpogba4687@gmail.com", "ByHost: ": "mail.felgui.pt:587", "Password: ": "=0Ab7YuNYukAG7", "From: ": "anapereira@felgui.pt"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.467242209.0000000000B01000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: RegAsm.exe PID: 3704JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: RegAsm.exe PID: 3704JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: RegAsm connects to smtp portShow sources
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 185.31.158.175, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, Initiated: true, ProcessId: 3704, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49753

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000003.00000002.467242209.0000000000B01000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=163Z2wAbbuss9WV_lMGQhSMyvIRqk02oq", "Injection Process": ["RegAsm.exe", "RegSvcs.exe", "MSBuild.exe"]}
            Source: RegAsm.exe.3704.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "Kz6StgI", "URL: ": "https://kgxZr9SNdkYE806O36R.com", "To: ": "paulpogba4687@gmail.com", "ByHost: ": "mail.felgui.pt:587", "Password: ": "=0Ab7YuNYukAG7", "From: ": "anapereira@felgui.pt"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: faktura_POfk.exeVirustotal: Detection: 55%Perma Link
            Source: faktura_POfk.exeMetadefender: Detection: 29%Perma Link
            Source: faktura_POfk.exeReversingLabs: Detection: 72%
            Source: faktura_POfk.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: unknownHTTPS traffic detected: 172.217.19.97:443 -> 192.168.2.3:49713 version: TLS 1.2

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=163Z2wAbbuss9WV_lMGQhSMyvIRqk02oq
            Source: Malware configuration extractorURLs: https://kgxZr9SNdkYE806O36R.com
            Source: global trafficTCP traffic: 192.168.2.3:49753 -> 185.31.158.175:587
            Source: Joe Sandbox ViewASN Name: ONILisbonPortugalPT ONILisbonPortugalPT
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficTCP traffic: 192.168.2.3:49753 -> 185.31.158.175:587
            Source: unknownDNS traffic detected: queries for: doc-0s-7c-docs.googleusercontent.com
            Source: RegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpString found in binary or memory: http://UugnHJ.com
            Source: RegAsm.exe, 00000003.00000002.466981864.0000000000A85000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: RegAsm.exe, 00000003.00000002.466981864.0000000000A85000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: RegAsm.exe, 00000003.00000002.466981864.0000000000A85000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
            Source: RegAsm.exe, 00000003.00000002.466981864.0000000000A85000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
            Source: RegAsm.exe, 00000003.00000002.475681369.000000001D957000.00000004.00000001.sdmpString found in binary or memory: http://felgui.pt
            Source: RegAsm.exe, 00000003.00000002.475681369.000000001D957000.00000004.00000001.sdmpString found in binary or memory: http://mail.felgui.pt
            Source: RegAsm.exe, 00000003.00000002.466981864.0000000000A85000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: RegAsm.exeString found in binary or memory: https://drive.google.com/uc?export=download&id=163Z2wAbbuss9WV_lMGQhSMyvIRqk02oq
            Source: RegAsm.exe, 00000003.00000002.467242209.0000000000B01000.00000040.00000001.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=163Z2wAbbuss9WV_lMGQhSMyvIRqk02oq8
            Source: RegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpString found in binary or memory: https://kgxZr9SNdkYE806O36R.com
            Source: RegAsm.exe, 00000003.00000002.466981864.0000000000A85000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: RegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownHTTPS traffic detected: 172.217.19.97:443 -> 192.168.2.3:49713 version: TLS 1.2

            System Summary:

            barindex
            Potential malicious icon foundShow sources
            Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C36A5 NtResumeThread,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B036A5 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B03260 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C8BC8F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C8B2D50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C8B2618
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C8B1FE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C8BAB70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C945DB8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C940114
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C94C2F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C946ECB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C946F78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C97A860
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C97C1B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C97691A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C97BA08
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C972FD4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C97A058
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C994E60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C996580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C99B0E8
            Source: faktura_POfk.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: faktura_POfk.exe, 00000000.00000002.249424652.0000000002090000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs faktura_POfk.exe
            Source: faktura_POfk.exe, 00000000.00000002.249171582.0000000000412000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameHidings1.exe vs faktura_POfk.exe
            Source: faktura_POfk.exe, 00000000.00000002.250122095.0000000002970000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameHidings1.exeFE2XADP vs faktura_POfk.exe
            Source: faktura_POfk.exeBinary or memory string: OriginalFilenameHidings1.exe vs faktura_POfk.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
            Source: faktura_POfk.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@6/1@3/2
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1092:120:WilError_01
            Source: faktura_POfk.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\faktura_POfk.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\faktura_POfk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: faktura_POfk.exeVirustotal: Detection: 55%
            Source: faktura_POfk.exeMetadefender: Detection: 29%
            Source: faktura_POfk.exeReversingLabs: Detection: 72%
            Source: unknownProcess created: C:\Users\user\Desktop\faktura_POfk.exe 'C:\Users\user\Desktop\faktura_POfk.exe'
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\faktura_POfk.exe'
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\faktura_POfk.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\faktura_POfk.exe'
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\faktura_POfk.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000003.00000002.467242209.0000000000B01000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3704, type: MEMORY
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_00406C7A push ss; iretd
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_00405B9B pushad ; iretd
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C0022 push esp; ret
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C305F push ecx; ret
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C1CD7 push edi; iretd
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C1F03 push 5CE4906Ch; retf
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C355F push ebp; retf
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C0981 push ds; iretd
            Source: C:\Users\user\Desktop\faktura_POfk.exeCode function: 0_2_020C13C3 push cs; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C8B7A37 push edi; retn 0000h
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C9494D4 push esi; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C94D09A push ss; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C94D0A2 push ss; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_1C990DD0 push 3C1C98CBh; retf
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\faktura_POfk.exeRDTSC instruction interceptor: First address: 00000000020C1897 second address: 00000000020C1897 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FA9E8A0E888h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e test dx, bx 0x00000021 add edi, edx 0x00000023 dec ecx 0x00000024 cmp ecx, 00000000h 0x00000027 jne 00007FA9E8A0E85Ch 0x00000029 push ecx 0x0000002a pushad 0x0000002b mov dx, 901Ch 0x0000002f cmp dx, 901Ch 0x00000034 jne 00007FA9E8A0D24Fh 0x0000003a popad 0x0000003b test dx, ax 0x0000003e call 00007FA9E8A0E89Eh 0x00000043 call 00007FA9E8A0E898h 0x00000048 lfence 0x0000004b mov edx, dword ptr [7FFE0014h] 0x00000051 lfence 0x00000054 ret 0x00000055 mov esi, edx 0x00000057 pushad 0x00000058 rdtsc
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\faktura_POfk.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\faktura_POfk.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exe, 00000003.00000002.467242209.0000000000B01000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE`
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\faktura_POfk.exeRDTSC instruction interceptor: First address: 00000000020C1897 second address: 00000000020C1897 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FA9E8A0E888h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e test dx, bx 0x00000021 add edi, edx 0x00000023 dec ecx 0x00000024 cmp ecx, 00000000h 0x00000027 jne 00007FA9E8A0E85Ch 0x00000029 push ecx 0x0000002a pushad 0x0000002b mov dx, 901Ch 0x0000002f cmp dx, 901Ch 0x00000034 jne 00007FA9E8A0D24Fh 0x0000003a popad 0x0000003b test dx, ax 0x0000003e call 00007FA9E8A0E89Eh 0x00000043 call 00007FA9E8A0E898h 0x00000048 lfence 0x0000004b mov edx, dword ptr [7FFE0014h] 0x00000051 lfence 0x00000054 ret 0x00000055 mov esi, edx 0x00000057 pushad 0x00000058 rdtsc
            Source: C:\Users\user\Desktop\faktura_POfk.exeRDTSC instruction interceptor: First address: 00000000020C1971 second address: 00000000020C1971 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FA9E88745D9h 0x0000001d popad 0x0000001e call 00007FA9E88733A6h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000B01971 second address: 0000000000B01971 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FA9E8A0FAD9h 0x0000001d popad 0x0000001e call 00007FA9E8A0E8A6h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B01DBC rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3983
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 5779
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4672Thread sleep time: -22136092888451448s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: RegAsm.exe, 00000003.00000002.467242209.0000000000B01000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe`
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\faktura_POfk.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B01DBC rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B01BBB LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B027FF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B017C4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B02A12 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B02E5F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\faktura_POfk.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: B00000
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\faktura_POfk.exe'
            Source: C:\Users\user\Desktop\faktura_POfk.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\faktura_POfk.exe'
            Source: RegAsm.exe, 00000003.00000002.468271202.0000000001250000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000003.00000002.468271202.0000000001250000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000003.00000002.468271202.0000000001250000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000003.00000002.468271202.0000000001250000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00B02A90 cpuid
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3704, type: MEMORY
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: Yara matchFile source: 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3704, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3704, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Process Injection112Disable or Modify Tools1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion341LSASS MemorySecurity Software Discovery631Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection112Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSVirtualization/Sandbox Evasion341Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol112SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery323Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            faktura_POfk.exe56%VirustotalBrowse
            faktura_POfk.exe35%MetadefenderBrowse
            faktura_POfk.exe72%ReversingLabsWin32.Trojan.Vebzenpak

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            felgui.pt0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://UugnHJ.com0%VirustotalBrowse
            http://UugnHJ.com0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://mail.felgui.pt0%Avira URL Cloudsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://felgui.pt0%Avira URL Cloudsafe
            https://kgxZr9SNdkYE806O36R.com0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            felgui.pt
            185.31.158.175
            truetrueunknown
            googlehosted.l.googleusercontent.com
            172.217.19.97
            truefalse
              high
              mail.felgui.pt
              unknown
              unknowntrue
                unknown
                doc-0s-7c-docs.googleusercontent.com
                unknown
                unknownfalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  https://kgxZr9SNdkYE806O36R.comtrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://UugnHJ.comRegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://DynDns.comDynDNSRegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://mail.felgui.ptRegAsm.exe, 00000003.00000002.475681369.000000001D957000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://sectigo.com/CPS0RegAsm.exe, 00000003.00000002.466981864.0000000000A85000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://felgui.ptRegAsm.exe, 00000003.00000002.475681369.000000001D957000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  172.217.19.97
                  googlehosted.l.googleusercontent.comUnited States
                  15169GOOGLEUSfalse
                  185.31.158.175
                  felgui.ptPortugal
                  9186ONILisbonPortugalPTtrue

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:392258
                  Start date:19.04.2021
                  Start time:12:43:16
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 33s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:faktura_POfk.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:25
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.evad.winEXE@6/1@3/2
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 48.8% (good quality ratio 23.3%)
                  • Quality average: 27.1%
                  • Quality standard deviation: 31.8%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 92.122.145.220, 204.79.197.200, 13.107.21.200, 104.42.151.234, 172.217.19.110, 95.101.184.67, 20.82.209.183, 168.61.161.212, 104.43.139.144, 13.88.21.125, 92.122.213.194, 92.122.213.247, 51.103.5.186, 2.20.142.209, 2.20.143.16, 20.54.26.129, 52.147.198.201, 20.82.210.154
                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, drive.google.com, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, skypedataprdcoleus16.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  12:44:32API Interceptor691x Sleep call for process: RegAsm.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  185.31.158.175faktura.exeGet hashmaliciousBrowse

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    ONILisbonPortugalPTfaktura.exeGet hashmaliciousBrowse
                    • 185.31.158.175
                    Orderlist_267409.pdf.exeGet hashmaliciousBrowse
                    • 185.90.59.42
                    PO_ 09162020.docGet hashmaliciousBrowse
                    • 185.90.59.243
                    https://demo.nrnow.pt/wp-content/themes/image/home.phpGet hashmaliciousBrowse
                    • 185.90.56.28
                    CWRO20-09.docGet hashmaliciousBrowse
                    • 185.90.59.243
                    #U5909#U53162020.09.docGet hashmaliciousBrowse
                    • 185.90.59.243
                    EQVNPU20.09.docGet hashmaliciousBrowse
                    • 185.90.59.243
                    0601_pdf.exeGet hashmaliciousBrowse
                    • 185.90.59.42
                    Clasquin France SARL - Demande client 001259 - SKBMT-07-29-2020-115-img00273.exeGet hashmaliciousBrowse
                    • 185.90.56.35
                    https://boavistawindows.comGet hashmaliciousBrowse
                    • 5.253.181.163
                    http://www.thevisionaire.net/Invoice-31882146/Get hashmaliciousBrowse
                    • 213.58.147.102
                    refugee.docGet hashmaliciousBrowse
                    • 213.58.147.102
                    refugee.docGet hashmaliciousBrowse
                    • 213.58.147.102

                    JA3 Fingerprints

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    37f463bf4616ecd445d4a1937da06e19VoicePlayback (0129) for paul.mathias brewin .htmlGet hashmaliciousBrowse
                    • 172.217.19.97
                    Shipment wk017 Note.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    P A Y M E N T (1).htmlGet hashmaliciousBrowse
                    • 172.217.19.97
                    SecuriteInfo.com.Trojan.Win32.Save.a.6606.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    invoice-order-21412-paypal.xlxs.vbsGet hashmaliciousBrowse
                    • 172.217.19.97
                    gSyJqxW85g.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    qLpyW8ZKA9.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    OVNQqw2Wx6.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    SecuriteInfo.com.Dropped.Trojan.GenericKD.46121735.25361.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    TdrN9e5f1d.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    jugOYmJLWt.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    catalog-1180297109.xlsmGet hashmaliciousBrowse
                    • 172.217.19.97
                    7yZsRpugG2.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    tp4F4Weybv.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    R31iR6jQNF.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    Ryan001.htmlGet hashmaliciousBrowse
                    • 172.217.19.97
                    XFkh7a5MnJ.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    SecuriteInfo.com.Trojan.GenericKD.46108979.11616.exeGet hashmaliciousBrowse
                    • 172.217.19.97
                    VoicePlayback (01_70) for t .htmlGet hashmaliciousBrowse
                    • 172.217.19.97
                    Kevin.Wood@tetratech.com.htmGet hashmaliciousBrowse
                    • 172.217.19.97

                    Dropped Files

                    No context

                    Created / dropped Files

                    \Device\ConDrv
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):30
                    Entropy (8bit):3.964735178725505
                    Encrypted:false
                    SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                    MD5:9F754B47B351EF0FC32527B541420595
                    SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                    SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                    SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: NordVPN directory not found!..

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):5.68620272522406
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.15%
                    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:faktura_POfk.exe
                    File size:73728
                    MD5:afc152f879700d92a9eefa03f5e455b9
                    SHA1:cf18af51aefaa2589a4a016ed6dfeba9f55737cc
                    SHA256:389faf1c0ff21042f461a7780ada634cd612b8cf4876b3ed41a98e31c246858c
                    SHA512:65fc74f9f2726244afe8f1247882ee4833d13643aa3e12849cddde1c4baddb14bdc02ccb4ce2ba45e2fd09cb77720005ea1c02101d545be167bd05c5a4a2d77e
                    SSDEEP:768:6DY9AuBQY4JnCShnAwY6K7p6RTuLtuLuB9fvn0sS8eqDa6kZWewiFG0qlw:GY+1AwvuEWBE8eqDa6kZgiFV
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L.....w`.....................0....................@................

                    File Icon

                    Icon Hash:20047c7c70f0e004

                    Static PE Info

                    General

                    Entrypoint:0x4015b4
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                    DLL Characteristics:
                    Time Stamp:0x6077E0A8 [Thu Apr 15 06:43:52 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:fff80e017e94a979a89868fcc864e987

                    Entrypoint Preview

                    Instruction
                    push 00401780h
                    call 00007FA9E8DD2CC5h
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    xor byte ptr [eax], al
                    add byte ptr [eax], al
                    cmp byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    sal dl, cl
                    aam 41h
                    push esp
                    dec esi
                    pop ds
                    dec ebx

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xf2340x28.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x8f0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x15c.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xe7f40xf000False0.460563151042data6.3311853976IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .data0x100000x12a80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                    .rsrc0x120000x8f00x1000False0.165283203125data1.92233393859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x127c00x130data
                    RT_ICON0x124d80x2e8data
                    RT_ICON0x123b00x128GLS_BINARY_LSB_FIRST
                    RT_GROUP_ICON0x123800x30data
                    RT_VERSION0x121500x230dataChineseTaiwan

                    Imports

                    DLLImport
                    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaFileOpen, __vbaNew2, __vbaR8Str, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                    Version Infos

                    DescriptionData
                    Translation0x0404 0x04b0
                    InternalNameHidings1
                    FileVersion1.00
                    CompanyNameADP
                    ProductNameADP
                    ProductVersion1.00
                    FileDescriptionADP
                    OriginalFilenameHidings1.exe

                    Possible Origin

                    Language of compilation systemCountry where language is spokenMap
                    ChineseTaiwan

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 19, 2021 12:44:22.927335978 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:22.980602980 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:22.980741978 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:22.981440067 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.034239054 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.062134981 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.062186956 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.062225103 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.062263012 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.062283039 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.062334061 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.062419891 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.073415041 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.126637936 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.126708984 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.127506018 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.184187889 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.628746986 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.628778934 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.628793955 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.628813028 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.628832102 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.628846884 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.628891945 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.632411957 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.632438898 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.632488012 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.632530928 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.636065960 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.636087894 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.636133909 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.636178017 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.639740944 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.639767885 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.639801025 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.639822960 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.643419981 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.643445969 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.643477917 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.643512011 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.647034883 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.647063017 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.647119045 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.647156000 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.681886911 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.681921005 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.681950092 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.681969881 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.683646917 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.683681011 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.683716059 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.683743000 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.687263966 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.687295914 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.687323093 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.687338114 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.690918922 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.690953970 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.690970898 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.690996885 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.694605112 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.694638968 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.694670916 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.694706917 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.698276997 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.698312044 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.698335886 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.698371887 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.701956987 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.701987982 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.702024937 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.702065945 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.705641031 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.705672979 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.705701113 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.705734015 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.709255934 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.709294081 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.709332943 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.709352970 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.712552071 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.712584019 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.712620020 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.712642908 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.715796947 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.715832949 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.715876102 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.715893030 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.719062090 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.719094038 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.719120026 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.719141006 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.722387075 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.722439051 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.722456932 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.722492933 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.725626945 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.725655079 CEST44349713172.217.19.97192.168.2.3
                    Apr 19, 2021 12:44:23.725687027 CEST49713443192.168.2.3172.217.19.97
                    Apr 19, 2021 12:44:23.725703955 CEST49713443192.168.2.3172.217.19.97

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 19, 2021 12:43:55.164190054 CEST6015253192.168.2.38.8.8.8
                    Apr 19, 2021 12:43:55.224848986 CEST53601528.8.8.8192.168.2.3
                    Apr 19, 2021 12:43:55.371681929 CEST5754453192.168.2.38.8.8.8
                    Apr 19, 2021 12:43:55.431113958 CEST53575448.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:02.312609911 CEST5598453192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:02.361279964 CEST53559848.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:21.060581923 CEST6418553192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:21.129548073 CEST53641858.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:22.857698917 CEST6511053192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:22.924175024 CEST53651108.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:32.989567041 CEST5836153192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:33.048547029 CEST53583618.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:33.245093107 CEST6349253192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:33.302557945 CEST53634928.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:33.980608940 CEST6083153192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:34.029902935 CEST53608318.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:34.889620066 CEST6010053192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:34.941276073 CEST53601008.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:39.731730938 CEST5319553192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:39.780668974 CEST53531958.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:41.113337994 CEST5014153192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:41.165029049 CEST53501418.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:42.231698990 CEST5302353192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:42.280687094 CEST53530238.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:44.243659973 CEST4956353192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:44.295497894 CEST53495638.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:45.235726118 CEST5135253192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:45.287733078 CEST53513528.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:45.776789904 CEST5934953192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:45.835462093 CEST53593498.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:46.199832916 CEST5708453192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:46.248701096 CEST53570848.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:47.102885962 CEST5882353192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:47.152602911 CEST53588238.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:47.999970913 CEST5756853192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:48.048785925 CEST53575688.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:48.938570023 CEST5054053192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:48.998049974 CEST53505408.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:49.866149902 CEST5436653192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:49.915057898 CEST53543668.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:50.775574923 CEST5303453192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:50.827012062 CEST53530348.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:51.235182047 CEST5776253192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:51.295101881 CEST53577628.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:51.602545023 CEST5543553192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:51.661283016 CEST53554358.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:52.099941969 CEST5071353192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:52.157282114 CEST53507138.8.8.8192.168.2.3
                    Apr 19, 2021 12:44:57.668296099 CEST5613253192.168.2.38.8.8.8
                    Apr 19, 2021 12:44:57.730659008 CEST53561328.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:04.420705080 CEST5898753192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:04.506027937 CEST53589878.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:05.775099039 CEST5657953192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:05.833540916 CEST53565798.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:25.989846945 CEST6063353192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:26.039206982 CEST53606338.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:26.873163939 CEST6129253192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:26.924705029 CEST53612928.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:28.107261896 CEST6361953192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:28.158092976 CEST53636198.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:28.943716049 CEST6493853192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:28.995768070 CEST53649388.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:30.360853910 CEST6194653192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:30.411071062 CEST53619468.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:30.915038109 CEST6491053192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:30.988703012 CEST53649108.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:54.378563881 CEST5212353192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:54.553798914 CEST53521238.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:54.570314884 CEST5613053192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:54.632246971 CEST53561308.8.8.8192.168.2.3
                    Apr 19, 2021 12:45:55.810924053 CEST5633853192.168.2.38.8.8.8
                    Apr 19, 2021 12:45:55.859524965 CEST53563388.8.8.8192.168.2.3

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Apr 19, 2021 12:44:22.857698917 CEST192.168.2.38.8.8.80xbf99Standard query (0)doc-0s-7c-docs.googleusercontent.comA (IP address)IN (0x0001)
                    Apr 19, 2021 12:45:54.378563881 CEST192.168.2.38.8.8.80x4c01Standard query (0)mail.felgui.ptA (IP address)IN (0x0001)
                    Apr 19, 2021 12:45:54.570314884 CEST192.168.2.38.8.8.80x2cc8Standard query (0)mail.felgui.ptA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Apr 19, 2021 12:44:22.924175024 CEST8.8.8.8192.168.2.30xbf99No error (0)doc-0s-7c-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                    Apr 19, 2021 12:44:22.924175024 CEST8.8.8.8192.168.2.30xbf99No error (0)googlehosted.l.googleusercontent.com172.217.19.97A (IP address)IN (0x0001)
                    Apr 19, 2021 12:45:54.553798914 CEST8.8.8.8192.168.2.30x4c01No error (0)mail.felgui.ptfelgui.ptCNAME (Canonical name)IN (0x0001)
                    Apr 19, 2021 12:45:54.553798914 CEST8.8.8.8192.168.2.30x4c01No error (0)felgui.pt185.31.158.175A (IP address)IN (0x0001)
                    Apr 19, 2021 12:45:54.632246971 CEST8.8.8.8192.168.2.30x2cc8No error (0)mail.felgui.ptfelgui.ptCNAME (Canonical name)IN (0x0001)
                    Apr 19, 2021 12:45:54.632246971 CEST8.8.8.8192.168.2.30x2cc8No error (0)felgui.pt185.31.158.175A (IP address)IN (0x0001)

                    HTTPS Packets

                    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                    Apr 19, 2021 12:44:23.062263012 CEST172.217.19.97443192.168.2.349713CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Mar 23 09:24:00 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Jun 15 10:23:59 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                    CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                    SMTP Packets

                    TimestampSource PortDest PortSource IPDest IPCommands
                    Apr 19, 2021 12:45:54.997169971 CEST58749753185.31.158.175192.168.2.3220-servidor3.scpdpi.pt ESMTP Exim 4.94 #2 Mon, 19 Apr 2021 11:45:54 +0100
                    220-We do not authorize the use of this system to transport unsolicited,
                    220 and/or bulk e-mail.
                    Apr 19, 2021 12:45:54.997787952 CEST49753587192.168.2.3185.31.158.175EHLO 114127
                    Apr 19, 2021 12:45:55.092035055 CEST58749753185.31.158.175192.168.2.3250-servidor3.scpdpi.pt Hello 114127 [84.17.52.3]
                    250-SIZE 52428800
                    250-8BITMIME
                    250-PIPELINING
                    250-X_PIPE_CONNECT
                    250-STARTTLS
                    250 HELP
                    Apr 19, 2021 12:45:55.092345953 CEST49753587192.168.2.3185.31.158.175STARTTLS
                    Apr 19, 2021 12:45:55.187799931 CEST58749753185.31.158.175192.168.2.3220 TLS go ahead

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:12:44:02
                    Start date:19/04/2021
                    Path:C:\Users\user\Desktop\faktura_POfk.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\faktura_POfk.exe'
                    Imagebase:0x400000
                    File size:73728 bytes
                    MD5 hash:AFC152F879700D92A9EEFA03F5E455B9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Visual Basic
                    Reputation:low

                    General

                    Start time:12:44:11
                    Start date:19/04/2021
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):false
                    Commandline:'C:\Users\user\Desktop\faktura_POfk.exe'
                    Imagebase:0x260000
                    File size:64616 bytes
                    MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:44:11
                    Start date:19/04/2021
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\faktura_POfk.exe'
                    Imagebase:0x710000
                    File size:64616 bytes
                    MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000003.00000002.467242209.0000000000B01000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.475025452.000000001D6A1000.00000004.00000001.sdmp, Author: Joe Security
                    Reputation:high

                    General

                    Start time:12:44:12
                    Start date:19/04/2021
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6b2800000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >