Loading ...

Play interactive tourEdit tour

Analysis Report ordine n#U00b0 276.exe

Overview

General Information

Sample Name:ordine n#U00b0 276.exe
Analysis ID:404980
MD5:10f03c95ba280cd5a82146269f89ca9d
SHA1:c24232721d7aefe2c013b9642e0ab7db8007e48a
SHA256:11f63d2fda1055ac66a71cb539c9d5ff66fd79f473e19171fd8f663e2c4979b9
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: RegAsm connects to smtp port
Yara detected AgentTesla
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides threads from debuggers
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Startup

  • System is w10x64
  • ordine n#U00b0 276.exe (PID: 6992 cmdline: 'C:\Users\user\Desktop\ordine n#U00b0 276.exe' MD5: 10F03C95BA280CD5A82146269F89CA9D)
    • RegAsm.exe (PID: 2588 cmdline: 'C:\Users\user\Desktop\ordine n#U00b0 276.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 6592 cmdline: 'C:\Users\user\Desktop\ordine n#U00b0 276.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
    • RegAsm.exe (PID: 6412 cmdline: 'C:\Users\user\Desktop\ordine n#U00b0 276.exe' MD5: 529695608EAFBED00ACA9E61EF333A7C)
      • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "M54FGDMtaO", "URL: ": "http://5Z6zzpV4pHjt.com", "To: ": "", "ByHost: ": "smtp.fil-net.com:587", "Password: ": "OLotoUPgHE9Y", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000000.638126535.000000000040C000.00000020.00020000.sdmpLokiBot_Dropper_Packed_R11_Feb18Auto-generated rule - file scan copy.pdf.r11Florian Roth
  • 0x1298:$s1: C:\Program Files (x86)\Microsoft Visual Studio\VB98\VB6.OLB
00000000.00000002.749114091.000000000040C000.00000020.00020000.sdmpLokiBot_Dropper_Packed_R11_Feb18Auto-generated rule - file scan copy.pdf.r11Florian Roth
  • 0x1298:$s1: C:\Program Files (x86)\Microsoft Visual Studio\VB98\VB6.OLB
00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: RegAsm.exe PID: 6412JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Click to see the 2 entries

        Sigma Overview

        Networking:

        barindex
        Sigma detected: RegAsm connects to smtp portShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 46.16.61.250, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe, Initiated: true, ProcessId: 6412, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49777

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: RegAsm.exe.6412.7.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "M54FGDMtaO", "URL: ": "http://5Z6zzpV4pHjt.com", "To: ": "", "ByHost: ": "smtp.fil-net.com:587", "Password: ": "OLotoUPgHE9Y", "From: ": ""}
        Multi AV Scanner detection for submitted fileShow sources
        Source: ordine n#U00b0 276.exeVirustotal: Detection: 26%Perma Link
        Source: ordine n#U00b0 276.exeReversingLabs: Detection: 35%
        Source: ordine n#U00b0 276.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.4:49766 version: TLS 1.2
        Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000007.00000002.1037344500.0000000020710000.00000002.00000001.sdmp

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: http://5Z6zzpV4pHjt.com
        Source: global trafficTCP traffic: 192.168.2.4:49777 -> 46.16.61.250:587
        Source: Joe Sandbox ViewIP Address: 46.16.61.250 46.16.61.250
        Source: Joe Sandbox ViewASN Name: CDMONsistemescdmoncomES CDMONsistemescdmoncomES
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: global trafficTCP traffic: 192.168.2.4:49777 -> 46.16.61.250:587
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D7DA09A recv,
        Source: unknownDNS traffic detected: queries for: doc-10-9k-docs.googleusercontent.com
        Source: RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
        Source: RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpString found in binary or memory: http://5Z6zzpV4pHjt.com
        Source: RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
        Source: RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
        Source: RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
        Source: RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
        Source: RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
        Source: RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
        Source: RegAsm.exe, 00000007.00000003.976218379.0000000001036000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
        Source: RegAsm.exe, 00000007.00000002.1031709055.0000000000FEF000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
        Source: RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gtsr1/gtsr1.crl0W
        Source: RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpString found in binary or memory: http://crls.pki.goog/gts1c3/QqFxbi9M48c.crl0
        Source: RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpString found in binary or memory: http://mGfDbY.com
        Source: RegAsm.exe, 00000007.00000003.976218379.0000000001036000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr10)
        Source: RegAsm.exe, 00000007.00000002.1031709055.0000000000FEF000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
        Source: RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1c301
        Source: RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
        Source: RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gtsr100
        Source: RegAsm.exe, 00000007.00000003.976218379.0000000001036000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
        Source: RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
        Source: RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/repo/certs/gts1c3.der0
        Source: RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/repo/certs/gtsr1.der04
        Source: RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0%
        Source: RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
        Source: RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
        Source: RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
        Source: RegAsm.exe, 00000007.00000003.976293343.0000000001005000.00000004.00000001.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/
        Source: RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpString found in binary or memory: https://doc-10-9k-docs.googleusercontent.com/
        Source: RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpString found in binary or memory: https://doc-10-9k-docs.googleusercontent.com/G
        Source: RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpString found in binary or memory: https://doc-10-9k-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/uf4tta3o
        Source: RegAsm.exe, 00000007.00000002.1031669686.0000000000FA8000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/
        Source: RegAsm.exe, 00000007.00000002.1031669686.0000000000FA8000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1eL1W59FTaS1ZK7NLLis7VKY3s5Fdhau-
        Source: RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpString found in binary or memory: https://pki.goog/repository/0
        Source: RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
        Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
        Source: unknownHTTPS traffic detected: 216.58.212.129:443 -> 192.168.2.4:49766 version: TLS 1.2

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000000.638126535.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
        Source: 00000000.00000002.749114091.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02172819 NtAllocateVirtualMemory,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D7DB0BA NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D7DB089 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040377D
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404647
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404263
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404463
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404A2C
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040483D
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004038C1
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040408E
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403E98
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403CB3
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404746
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404551
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00404365
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040493B
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004039C7
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004037CB
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403F94
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00403D9F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_01124850
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_0112C4F8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_0112ABEC
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_01126A08
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_01126270
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_0112D038
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D390F38
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D395F08
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D392C00
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D390070
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D393580
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D397DC1
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D390007
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1FBBE8A2
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1FBB8EF0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1FBB7C48
        Source: ordine n#U00b0 276.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: ordine n#U00b0 276.exe, 00000000.00000002.749125569.0000000000417000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameOPARBE.exe vs ordine n#U00b0 276.exe
        Source: ordine n#U00b0 276.exeBinary or memory string: OriginalFilenameOPARBE.exe vs ordine n#U00b0 276.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: security.dll
        Source: ordine n#U00b0 276.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 00000000.00000000.638126535.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.749114091.000000000040C000.00000020.00020000.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@8/2@3/2
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D7DAF3E AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_1D7DAF07 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\1sxxov2t.dy0Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_01
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeFile created: C:\Users\user\AppData\Local\Temp\~DF49B334E29C6CF724.TMPJump to behavior
        Source: ordine n#U00b0 276.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: ordine n#U00b0 276.exeVirustotal: Detection: 26%
        Source: ordine n#U00b0 276.exeReversingLabs: Detection: 35%
        Source: unknownProcess created: C:\Users\user\Desktop\ordine n#U00b0 276.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Binary string: mscorrc.pdb source: RegAsm.exe, 00000007.00000002.1037344500.0000000020710000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        Yara detected GuLoaderShow sources
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6412, type: MEMORY
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407CDB push es; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040CEF8 push ebp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040855C push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00408565 push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00408565 push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407D6F push edx; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407B2B push ds; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407FCC push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00405BD3 push DD90C9D6h; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00408DD4 push esi; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00405BE4 push DD90C9D6h; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00407F8D push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_00405D90 push esp; iretd
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_021712B8 push ebp; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0217131E push ebp; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0217230E push edx; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02170056 push ebp; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02173043 push 74E8A32Bh; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02173093 push 18ECA32Bh; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_021717CB push edx; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_021724A9 push ebx; ret
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0217085E push 0000002Bh; retf
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_021708C8 push 0000002Bh; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_01125B00 push 0000001Ch; mov dword ptr [esp], eax
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 7_2_201E406C push ss; iretd
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeRDTSC instruction interceptor: First address: 00000000021723B7 second address: 00000000021723B7 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FF0B4859808h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp dh, ch 0x0000001f pop ecx 0x00000020 add edi, edx 0x00000022 test ecx, 93E93443h 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007FF0B48597E6h 0x0000002e test cx, 1904h 0x00000033 push ecx 0x00000034 call 00007FF0B4859822h 0x00000039 call 00007FF0B4859818h 0x0000003e lfence 0x00000041 mov edx, dword ptr [7FFE0014h] 0x00000047 lfence 0x0000004a ret 0x0000004b mov esi, edx 0x0000004d pushad 0x0000004e rdtsc
        Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFunction Chain: systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,systemQueried,threadDelayed,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,memAlloc,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,keyOpened,keyEnumerated
        Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Tries to detect Any.runShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: ordine n#U00b0 276.exe, 00000000.00000002.749418679.0000000002180000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V2.0.50727\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
        Source: ordine n#U00b0 276.exe, 00000000.00000002.749418679.0000000002180000.00000004.00000001.sdmp, RegAsm.exe, 00000007.00000002.1031397639.00000000009B0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Source: RegAsm.exe, 00000007.00000002.1031397639.00000000009B0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
        Tries to detect virtualization through RDTSC time measurementsShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeRDTSC instruction interceptor: First address: 00000000021723B7 second address: 00000000021723B7 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FF0B4859808h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d cmp dh, ch 0x0000001f pop ecx 0x00000020 add edi, edx 0x00000022 test ecx, 93E93443h 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007FF0B48597E6h 0x0000002e test cx, 1904h 0x00000033 push ecx 0x00000034 call 00007FF0B4859822h 0x00000039 call 00007FF0B4859818h 0x0000003e lfence 0x00000041 mov edx, dword ptr [7FFE0014h] 0x00000047 lfence 0x0000004a ret 0x0000004b mov esi, edx 0x0000004d pushad 0x0000004e rdtsc
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeRDTSC instruction interceptor: First address: 0000000002172528 second address: 0000000002172528 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FF0B4BA9AF0h 0x0000001d popad 0x0000001e call 00007FF0B4BA78EAh 0x00000023 lfence 0x00000026 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000D02528 second address: 0000000000D02528 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FF0B485BA20h 0x0000001d popad 0x0000001e call 00007FF0B485981Ah 0x00000023 lfence 0x00000026 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWindow / User API: threadDelayed 785
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5972Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5972Thread sleep time: -23550000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5972Thread sleep time: -60000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 5972Thread sleep time: -30000s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread delayed: delay time: 30000
        Source: RegAsm.exe, 00000007.00000002.1031709055.0000000000FEF000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWight Filter-0000
        Source: RegAsm.exe, 00000007.00000002.1036867181.000000001FFB0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: RegAsm.exe, 00000007.00000002.1031709055.0000000000FEF000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
        Source: ordine n#U00b0 276.exe, 00000000.00000002.749418679.0000000002180000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dllwindir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dllwindir=\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe\syswow64\msvbvm60.dll
        Source: RegAsm.exe, 00000007.00000002.1031669686.0000000000FA8000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW(
        Source: RegAsm.exe, 00000007.00000002.1036867181.000000001FFB0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: ordine n#U00b0 276.exe, 00000000.00000002.749418679.0000000002180000.00000004.00000001.sdmp, RegAsm.exe, 00000007.00000002.1031397639.00000000009B0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: RegAsm.exe, 00000007.00000002.1036867181.000000001FFB0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: RegAsm.exe, 00000007.00000002.1031397639.00000000009B0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeMsi.dllPublishershell32advapi32USERPROFILE=wininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        Source: RegAsm.exe, 00000007.00000002.1036867181.000000001FFB0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_02173174 LdrInitializeThunk,
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_0040377D mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004038C1 mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004039C7 mov ebx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeCode function: 0_2_004037CB mov ebx, dword ptr fs:[00000030h]
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: D00000
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe 'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
        Source: RegAsm.exe, 00000007.00000002.1031900684.0000000001590000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: RegAsm.exe, 00000007.00000002.1031900684.0000000001590000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegAsm.exe, 00000007.00000002.1031900684.0000000001590000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegAsm.exe, 00000007.00000002.1031900684.0000000001590000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Desktop\ordine n#U00b0 276.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6412, type: MEMORY
        Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
        Tries to harvest and steal browser information (history, passwords, etc)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
        Tries to harvest and steal ftp login credentialsShow sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
        Tries to steal Mail credentials (via file access)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: Yara matchFile source: 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6412, type: MEMORY

        Remote Access Functionality:

        barindex
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6412, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools11OS Credential Dumping2System Information Discovery314Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsNative API1Boot or Logon Initialization ScriptsAccess Token Manipulation1Obfuscated Files or Information1Credentials in Registry1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Process Injection112DLL Side-Loading1Security Account ManagerSecurity Software Discovery621SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion341LSA SecretsVirtualization/Sandbox Evasion341SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol112Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 404980 Sample: ordine n#U00b0 276.exe Startdate: 05/05/2021 Architecture: WINDOWS Score: 100 26 Found malware configuration 2->26 28 Malicious sample detected (through community Yara rule) 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 7 other signatures 2->32 7 ordine n#U00b0 276.exe 1 2->7         started        process3 signatures4 34 Writes to foreign memory regions 7->34 36 Tries to detect Any.run 7->36 38 Hides threads from debuggers 7->38 10 RegAsm.exe 15 7->10         started        14 RegAsm.exe 7->14         started        16 RegAsm.exe 7->16         started        process5 dnsIp6 20 smtp.fil-net.com 46.16.61.250, 49777, 49778, 587 CDMONsistemescdmoncomES Spain 10->20 22 googlehosted.l.googleusercontent.com 216.58.212.129, 443, 49766 GOOGLEUS United States 10->22 24 doc-10-9k-docs.googleusercontent.com 10->24 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->40 42 Tries to steal Mail credentials (via file access) 10->42 44 Tries to harvest and steal ftp login credentials 10->44 54 3 other signatures 10->54 18 conhost.exe 10->18         started        46 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->46 48 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->48 50 Tries to detect virtualization through RDTSC time measurements 14->50 52 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 14->52 signatures7 process8

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        ordine n#U00b0 276.exe26%VirustotalBrowse
        ordine n#U00b0 276.exe36%ReversingLabsWin32.Trojan.Mucc

        Dropped Files

        No Antivirus matches

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        smtp.fil-net.com0%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://5Z6zzpV4pHjt.com0%Avira URL Cloudsafe
        http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://crl.pki.goog/gsr1/gsr1.crl0;0%Avira URL Cloudsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
        http://crl.pki.goog/gtsr1/gtsr1.crl0W0%Avira URL Cloudsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://pki.goog/gsr1/gsr1.crt020%Avira URL Cloudsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        http://crls.pki.goog/gts1c3/QqFxbi9M48c.crl00%Avira URL Cloudsafe
        https://api.ipify.org%0%URL Reputationsafe
        https://api.ipify.org%0%URL Reputationsafe
        https://api.ipify.org%0%URL Reputationsafe
        http://mGfDbY.com0%Avira URL Cloudsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
        http://r3.i.lencr.org/0%0%Avira URL Cloudsafe
        http://pki.goog/repo/certs/gts1c3.der00%Avira URL Cloudsafe
        http://pki.goog/repo/certs/gtsr1.der040%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        smtp.fil-net.com
        46.16.61.250
        truetrueunknown
        googlehosted.l.googleusercontent.com
        216.58.212.129
        truefalse
          high
          doc-10-9k-docs.googleusercontent.com
          unknown
          unknownfalse
            high

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://5Z6zzpV4pHjt.comtrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://DynDns.comDynDNSRegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://crl.pki.goog/gsr1/gsr1.crl0;RegAsm.exe, 00000007.00000003.976218379.0000000001036000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://doc-10-9k-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/uf4tta3oRegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpfalse
              high
              http://cps.letsencrypt.org0RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://doc-10-9k-docs.googleusercontent.com/GRegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpfalse
                high
                http://crl.pki.goog/GTS1O1core.crl0RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://r3.o.lencr.org0RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://api.ipify.org%GETMozilla/5.0RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                low
                http://crl.pki.goog/gtsr1/gtsr1.crl0WRegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://pki.goog/gsr2/GTS1O1.crt0RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://pki.goog/gsr1/gsr1.crt02RegAsm.exe, 00000007.00000003.976218379.0000000001036000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.pki.goog/gsr2/gsr2.crl0?RegAsm.exe, 00000007.00000002.1031709055.0000000000FEF000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://pki.goog/repository/0RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crls.pki.goog/gts1c3/QqFxbi9M48c.crl0RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://doc-10-9k-docs.googleusercontent.com/RegAsm.exe, 00000007.00000002.1031722866.000000000100D000.00000004.00000020.sdmpfalse
                  high
                  https://api.ipify.org%RegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  low
                  http://mGfDbY.comRegAsm.exe, 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://cps.root-x1.letsencrypt.org0RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://r3.i.lencr.org/0%RegAsm.exe, 00000007.00000002.1035500549.000000001DBB8000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://pki.goog/repo/certs/gts1c3.der0RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://pki.goog/repo/certs/gtsr1.der04RegAsm.exe, 00000007.00000002.1031747956.000000000103D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  216.58.212.129
                  googlehosted.l.googleusercontent.comUnited States
                  15169GOOGLEUSfalse
                  46.16.61.250
                  smtp.fil-net.comSpain
                  197712CDMONsistemescdmoncomEStrue

                  General Information

                  Joe Sandbox Version:32.0.0 Black Diamond
                  Analysis ID:404980
                  Start date:05.05.2021
                  Start time:17:00:25
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 58s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:ordine n#U00b0 276.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:20
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.spre.troj.spyw.evad.winEXE@8/2@3/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 3.5% (good quality ratio 1.7%)
                  • Quality average: 32.8%
                  • Quality standard deviation: 37%
                  HCA Information:
                  • Successful, ratio: 96%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Excluded IPs from analysis (whitelisted): 52.113.196.254, 104.43.139.144, 13.107.3.254, 13.107.246.254, 168.61.161.212, 52.255.188.83, 20.50.102.62, 92.122.213.194, 92.122.213.247, 52.155.217.156, 20.54.26.129, 142.250.185.78, 13.107.4.50, 93.184.220.29, 20.82.209.183
                  • TCP Packets have been reduced to 100
                  • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, s-ring.msedge.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, teams-9999.teams-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, drive.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, elasticShed.au.au-msedge.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, c-0001.c-msedge.net, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, s-ring.s-9999.s-msedge.net, t-ring.msedge.net, afdap.au.au-msedge.net, ris.api.iris.microsoft.com, t-9999.t-msedge.net, skypedataprdcoleus17.cloudapp.net, au.au-msedge.net, s-9999.s-msedge.net, blobcollector.events.data.trafficmanager.net, au.c-0001.c-msedge.net, crl3.digicert.com, teams-ring.teams-9999.teams-msedge.net, teams-ring.msedge.net, t-ring.t-9999.t-msedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  17:02:05API Interceptor1130x Sleep call for process: RegAsm.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  46.16.61.250ordine n#U00b0 276.exeGet hashmaliciousBrowse
                    a5FVSNazgr.exeGet hashmaliciousBrowse
                      HdgnMEvcFK.exeGet hashmaliciousBrowse
                        RTStyEQJpZ.exeGet hashmaliciousBrowse
                          PAGO.xlsxGet hashmaliciousBrowse
                            PRESUPUESTO.xlsxGet hashmaliciousBrowse
                              Zapytanie -20216470859302.exeGet hashmaliciousBrowse
                                winlog.exeGet hashmaliciousBrowse
                                  PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                    Nakit Akisi Detaylariniz.exeGet hashmaliciousBrowse
                                      S67xSX1MNR.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        smtp.fil-net.comZapytanie -20216470859302.exeGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        Nakit Akisi Detaylariniz.exeGet hashmaliciousBrowse
                                        • 46.16.61.250

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        CDMONsistemescdmoncomESordine n#U00b0 276.exeGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        a5FVSNazgr.exeGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        HdgnMEvcFK.exeGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        RTStyEQJpZ.exeGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        PAGO.xlsxGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        Zapytanie -20216470859302.exeGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        njGJ1eW44wshoMr.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        3nG9LW7Z21dxUoM.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        keeFDE9dhCGNNez.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        74tF1foMeQyUMCh.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        qm7JU84PFgfqvgs.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        winlog.exeGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • 46.16.61.250
                                        WbGKi8E5OE4eCFG.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        r9SWnqQlK8PFPEp.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        L9oOm9x3I7YZFcA.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        SecuriteInfo.com.Trojan.DownLoader36.34557.26355.exeGet hashmaliciousBrowse
                                        • 134.0.10.35
                                        jKiL1mzTAVltJ30.exeGet hashmaliciousBrowse
                                        • 46.16.62.134
                                        09xcuRN2HJmRRCm.exeGet hashmaliciousBrowse
                                        • 46.16.62.134

                                        JA3 Fingerprints

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        37f463bf4616ecd445d4a1937da06e19tncGQWIL6H.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        CT3nHWujrM.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        build.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        eDg92MgQgh.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        c2de9c66_by_Libranalysis.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        SecuriteInfo.com.Mal.Generic-S.21221.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        SecuriteInfo.com.W32.AIDetect.malware2.12980.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        proforma invoice No. 42037,pdf.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        jt50apTCUS.docxGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        SecuriteInfo.com.Heur.32597.xlsGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        SecuriteInfo.com.ArtemisTrojan.25081.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        Update_new32.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        PaymentAdvice - Copy.htmGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        INVOICE & STATEMENTS -COPY.htmGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        DGNTL04052021.2-8864.htmlGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        Proforma adjunta N#U00ba 42037,pdf.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        Notes Received gcgaming.com.htmlGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        7D1E.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        5.exeGet hashmaliciousBrowse
                                        • 216.58.212.129
                                        ordine n#U00b0 276.exeGet hashmaliciousBrowse
                                        • 216.58.212.129

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Users\user\AppData\Roaming\1sxxov2t.dy0\Chrome\Default\Cookies
                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                        Category:modified
                                        Size (bytes):20480
                                        Entropy (8bit):0.7006690334145785
                                        Encrypted:false
                                        SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                        MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                        SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                        SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                        SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        \Device\ConDrv
                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):30
                                        Entropy (8bit):3.964735178725505
                                        Encrypted:false
                                        SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                        MD5:9F754B47B351EF0FC32527B541420595
                                        SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                        SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                        SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: NordVPN directory not found!..

                                        Static File Info

                                        General

                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):4.764868199016906
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.15%
                                        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:ordine n#U00b0 276.exe
                                        File size:98304
                                        MD5:10f03c95ba280cd5a82146269f89ca9d
                                        SHA1:c24232721d7aefe2c013b9642e0ab7db8007e48a
                                        SHA256:11f63d2fda1055ac66a71cb539c9d5ff66fd79f473e19171fd8f663e2c4979b9
                                        SHA512:4b537aec0eee96b506ac63fcbdffc4e1e2ac231ca8d5136cfe7a67e84ac5643424d7090ae88ddb3e809d94272fa15edb20ed70964076fbf05260dceabac5ab76
                                        SSDEEP:1536:kh70hrnoEdQNvX1/o3IAEmYY6qbtug0Oj1o/:kl0tnoO81/4OYZJGO5S
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L.....UQ.................P... ......|........`....@................

                                        File Icon

                                        Icon Hash:b074cecec891b2e4

                                        Static PE Info

                                        General

                                        Entrypoint:0x40157c
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                        DLL Characteristics:
                                        Time Stamp:0x51551DDA [Fri Mar 29 04:51:38 2013 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:631ffe9ad0b821781f48149fabda62f6

                                        Entrypoint Preview

                                        Instruction
                                        push 0040CC14h
                                        call 00007FF0B45C6375h
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        xor byte ptr [eax], al
                                        add byte ptr [eax], al
                                        inc eax
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [esp], bl
                                        or eax, CA69BFC2h
                                        inc edi
                                        lodsb
                                        jmp far 22F3h : 4FE1EAFFh
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add dword ptr [eax], eax
                                        add byte ptr [eax], al
                                        or eax, 270A0D0Ah
                                        dec ebp
                                        push ebp
                                        dec esi
                                        push edx
                                        inc ebp
                                        push ecx
                                        push ebp
                                        dec ecx
                                        push esp
                                        add byte ptr [0A0D200Ah], cl
                                        or eax, 0000000Ah
                                        add bh, bh
                                        int3
                                        xor dword ptr [eax], eax
                                        sub byte ptr [ecx-1Bh], bl
                                        aaa
                                        int3
                                        std
                                        mov dword ptr [F68E487Eh], eax
                                        pop ebx
                                        or eax, AFD57F95h
                                        jl 00007FF0B45C635Dh
                                        test eax, E711F84Fh
                                        dec edi
                                        pushfd
                                        adc dword ptr [esi+48E65169h], ebx
                                        sub al, 3Ah
                                        dec edi
                                        lodsd
                                        xor ebx, dword ptr [ecx-48EE309Ah]
                                        or al, 00h
                                        stosb
                                        add byte ptr [eax-2Dh], ah
                                        xchg eax, ebx
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        xor eax, 470000B5h
                                        add al, byte ptr [eax]
                                        add byte ptr [eax], al
                                        add al, 00h
                                        insd
                                        popad
                                        jc 00007FF0B45C63EFh
                                        add byte ptr [43000501h], cl
                                        dec edi
                                        push esi
                                        inc ebp
                                        push esp
                                        add byte ptr [ecx], bl
                                        add dword ptr [eax], eax
                                        inc edx

                                        Data Directories

                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x150540x28.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x5a4.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                        IMAGE_DIRECTORY_ENTRY_IAT0x10000x10c.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                        Sections

                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x144d00x15000False0.33740234375data5.19887366844IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .data0x160000xad40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                        .rsrc0x170000x5a40x1000False0.1826171875data1.71136635862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                        Resources

                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0x173bc0x1e8data
                                        RT_GROUP_ICON0x173a80x14data
                                        RT_VERSION0x170f00x2b8COM executable for DOSEnglishUnited States

                                        Imports

                                        DLLImport
                                        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                                        Version Infos

                                        DescriptionData
                                        Translation0x0409 0x04b0
                                        InternalNameOPARBE
                                        FileVersion1.00
                                        CompanyNameMummys Technology
                                        CommentsMummys Technology
                                        ProductNameMummys Technology
                                        ProductVersion1.00
                                        FileDescriptionMummys Technology
                                        OriginalFilenameOPARBE.exe

                                        Possible Origin

                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States

                                        Network Behavior

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        May 5, 2021 17:01:59.135849953 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.178808928 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.179025888 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.181459904 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.222148895 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.229161978 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.229185104 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.229208946 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.229227066 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.229264021 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.229285002 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.229300976 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.229361057 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.229367018 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.282052040 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.323013067 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.323106050 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.324456930 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.370457888 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.583566904 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.583615065 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.583657026 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.583673000 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.583693981 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.583713055 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.584429026 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.584486008 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.584516048 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.584552050 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.587285995 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.587330103 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.587373972 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.587399960 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.590076923 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.590120077 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.590176105 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.590215921 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.592981100 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.593024015 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.593056917 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.593084097 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.595828056 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.595870972 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.595913887 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.595940113 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.598767042 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.598818064 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.598855972 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.598871946 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.601583958 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.601624966 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.601670027 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.601696968 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.624628067 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.624690056 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.624756098 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.624783993 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.625996113 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.626038074 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.626087904 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.626105070 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.628684044 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.628725052 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.628751993 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.628784895 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.631668091 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.631711960 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.631751060 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.631772041 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.634428024 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.634474039 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.634510994 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.634531021 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.637259007 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.637299061 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.637339115 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.637358904 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.640144110 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.640194893 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.640223026 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.640248060 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.643033981 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.643075943 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.643100023 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.643137932 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.645854950 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.645896912 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.645924091 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.645945072 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.648542881 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.648590088 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.648606062 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.648638964 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.650917053 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.650959969 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.650995970 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.651015043 CEST49766443192.168.2.4216.58.212.129
                                        May 5, 2021 17:01:59.653450012 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.653491974 CEST44349766216.58.212.129192.168.2.4
                                        May 5, 2021 17:01:59.653515100 CEST49766443192.168.2.4216.58.212.129

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        May 5, 2021 17:01:03.690494061 CEST5802853192.168.2.48.8.8.8
                                        May 5, 2021 17:01:03.739600897 CEST53580288.8.8.8192.168.2.4
                                        May 5, 2021 17:01:03.983526945 CEST5309753192.168.2.48.8.8.8
                                        May 5, 2021 17:01:04.033890963 CEST53530978.8.8.8192.168.2.4
                                        May 5, 2021 17:01:04.040508032 CEST4925753192.168.2.48.8.8.8
                                        May 5, 2021 17:01:04.092152119 CEST53492578.8.8.8192.168.2.4
                                        May 5, 2021 17:01:04.267797947 CEST6238953192.168.2.48.8.8.8
                                        May 5, 2021 17:01:04.319478989 CEST53623898.8.8.8192.168.2.4
                                        May 5, 2021 17:01:05.427966118 CEST4991053192.168.2.48.8.8.8
                                        May 5, 2021 17:01:05.481971025 CEST53499108.8.8.8192.168.2.4
                                        May 5, 2021 17:01:07.142071962 CEST5585453192.168.2.48.8.8.8
                                        May 5, 2021 17:01:07.193872929 CEST53558548.8.8.8192.168.2.4
                                        May 5, 2021 17:01:08.334923029 CEST6454953192.168.2.48.8.8.8
                                        May 5, 2021 17:01:08.387028933 CEST53645498.8.8.8192.168.2.4
                                        May 5, 2021 17:01:09.247404099 CEST6315353192.168.2.48.8.8.8
                                        May 5, 2021 17:01:09.304781914 CEST53631538.8.8.8192.168.2.4
                                        May 5, 2021 17:01:10.437279940 CEST5299153192.168.2.48.8.8.8
                                        May 5, 2021 17:01:10.487998009 CEST53529918.8.8.8192.168.2.4
                                        May 5, 2021 17:01:11.466536999 CEST5370053192.168.2.48.8.8.8
                                        May 5, 2021 17:01:11.515269041 CEST53537008.8.8.8192.168.2.4
                                        May 5, 2021 17:01:12.525285959 CEST5172653192.168.2.48.8.8.8
                                        May 5, 2021 17:01:12.574664116 CEST53517268.8.8.8192.168.2.4
                                        May 5, 2021 17:01:13.431174040 CEST5679453192.168.2.48.8.8.8
                                        May 5, 2021 17:01:13.480317116 CEST53567948.8.8.8192.168.2.4
                                        May 5, 2021 17:01:14.339106083 CEST5653453192.168.2.48.8.8.8
                                        May 5, 2021 17:01:14.395970106 CEST53565348.8.8.8192.168.2.4
                                        May 5, 2021 17:01:15.286114931 CEST5662753192.168.2.48.8.8.8
                                        May 5, 2021 17:01:15.346343994 CEST53566278.8.8.8192.168.2.4
                                        May 5, 2021 17:01:16.277062893 CEST5662153192.168.2.48.8.8.8
                                        May 5, 2021 17:01:16.327723026 CEST53566218.8.8.8192.168.2.4
                                        May 5, 2021 17:01:17.205954075 CEST6311653192.168.2.48.8.8.8
                                        May 5, 2021 17:01:17.257935047 CEST53631168.8.8.8192.168.2.4
                                        May 5, 2021 17:01:18.124769926 CEST6407853192.168.2.48.8.8.8
                                        May 5, 2021 17:01:18.173777103 CEST53640788.8.8.8192.168.2.4
                                        May 5, 2021 17:01:19.120851040 CEST6480153192.168.2.48.8.8.8
                                        May 5, 2021 17:01:19.171756029 CEST53648018.8.8.8192.168.2.4
                                        May 5, 2021 17:01:19.999878883 CEST6172153192.168.2.48.8.8.8
                                        May 5, 2021 17:01:20.048785925 CEST53617218.8.8.8192.168.2.4
                                        May 5, 2021 17:01:21.745997906 CEST5125553192.168.2.48.8.8.8
                                        May 5, 2021 17:01:21.796354055 CEST53512558.8.8.8192.168.2.4
                                        May 5, 2021 17:01:27.584459066 CEST6152253192.168.2.48.8.8.8
                                        May 5, 2021 17:01:27.635942936 CEST53615228.8.8.8192.168.2.4
                                        May 5, 2021 17:01:34.861730099 CEST5233753192.168.2.48.8.8.8
                                        May 5, 2021 17:01:34.922353029 CEST53523378.8.8.8192.168.2.4
                                        May 5, 2021 17:01:39.237457991 CEST5504653192.168.2.48.8.8.8
                                        May 5, 2021 17:01:39.297370911 CEST53550468.8.8.8192.168.2.4
                                        May 5, 2021 17:01:52.846262932 CEST4961253192.168.2.48.8.8.8
                                        May 5, 2021 17:01:52.994647980 CEST53496128.8.8.8192.168.2.4
                                        May 5, 2021 17:01:53.728523016 CEST4928553192.168.2.48.8.8.8
                                        May 5, 2021 17:01:53.861010075 CEST53492858.8.8.8192.168.2.4
                                        May 5, 2021 17:01:54.406605959 CEST5060153192.168.2.48.8.8.8
                                        May 5, 2021 17:01:54.464427948 CEST53506018.8.8.8192.168.2.4
                                        May 5, 2021 17:01:54.866115093 CEST6087553192.168.2.48.8.8.8
                                        May 5, 2021 17:01:54.928509951 CEST53608758.8.8.8192.168.2.4
                                        May 5, 2021 17:01:55.453356028 CEST5644853192.168.2.48.8.8.8
                                        May 5, 2021 17:01:55.512281895 CEST53564488.8.8.8192.168.2.4
                                        May 5, 2021 17:01:55.862121105 CEST5917253192.168.2.48.8.8.8
                                        May 5, 2021 17:01:55.927783012 CEST53591728.8.8.8192.168.2.4
                                        May 5, 2021 17:01:56.062057972 CEST6242053192.168.2.48.8.8.8
                                        May 5, 2021 17:01:56.110846043 CEST53624208.8.8.8192.168.2.4
                                        May 5, 2021 17:01:56.558742046 CEST6057953192.168.2.48.8.8.8
                                        May 5, 2021 17:01:56.621804953 CEST53605798.8.8.8192.168.2.4
                                        May 5, 2021 17:01:57.367877007 CEST5018353192.168.2.48.8.8.8
                                        May 5, 2021 17:01:57.429572105 CEST53501838.8.8.8192.168.2.4
                                        May 5, 2021 17:01:57.893667936 CEST6153153192.168.2.48.8.8.8
                                        May 5, 2021 17:01:57.950640917 CEST53615318.8.8.8192.168.2.4
                                        May 5, 2021 17:01:58.288770914 CEST4922853192.168.2.48.8.8.8
                                        May 5, 2021 17:01:58.346333981 CEST53492288.8.8.8192.168.2.4
                                        May 5, 2021 17:01:58.408456087 CEST5979453192.168.2.48.8.8.8
                                        May 5, 2021 17:01:58.466267109 CEST53597948.8.8.8192.168.2.4
                                        May 5, 2021 17:01:58.743185043 CEST5591653192.168.2.48.8.8.8
                                        May 5, 2021 17:01:59.041968107 CEST53559168.8.8.8192.168.2.4
                                        May 5, 2021 17:01:59.065201998 CEST5275253192.168.2.48.8.8.8
                                        May 5, 2021 17:01:59.133631945 CEST53527528.8.8.8192.168.2.4
                                        May 5, 2021 17:02:10.696511984 CEST6054253192.168.2.48.8.8.8
                                        May 5, 2021 17:02:10.772339106 CEST53605428.8.8.8192.168.2.4
                                        May 5, 2021 17:02:10.826412916 CEST6068953192.168.2.48.8.8.8
                                        May 5, 2021 17:02:10.900535107 CEST53606898.8.8.8192.168.2.4
                                        May 5, 2021 17:02:15.434143066 CEST6420653192.168.2.48.8.8.8
                                        May 5, 2021 17:02:15.493031979 CEST53642068.8.8.8192.168.2.4
                                        May 5, 2021 17:02:43.400177956 CEST5090453192.168.2.48.8.8.8
                                        May 5, 2021 17:02:43.460458994 CEST53509048.8.8.8192.168.2.4
                                        May 5, 2021 17:02:44.388366938 CEST5752553192.168.2.48.8.8.8
                                        May 5, 2021 17:02:44.457710981 CEST53575258.8.8.8192.168.2.4
                                        May 5, 2021 17:02:46.015604973 CEST5381453192.168.2.48.8.8.8
                                        May 5, 2021 17:02:46.088701010 CEST53538148.8.8.8192.168.2.4
                                        May 5, 2021 17:03:28.515350103 CEST5341853192.168.2.48.8.8.8
                                        May 5, 2021 17:03:28.581509113 CEST53534188.8.8.8192.168.2.4
                                        May 5, 2021 17:03:29.291996956 CEST6283353192.168.2.48.8.8.8
                                        May 5, 2021 17:03:29.367165089 CEST53628338.8.8.8192.168.2.4

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        May 5, 2021 17:01:59.065201998 CEST192.168.2.48.8.8.80xbabdStandard query (0)doc-10-9k-docs.googleusercontent.comA (IP address)IN (0x0001)
                                        May 5, 2021 17:03:28.515350103 CEST192.168.2.48.8.8.80xff76Standard query (0)smtp.fil-net.comA (IP address)IN (0x0001)
                                        May 5, 2021 17:03:29.291996956 CEST192.168.2.48.8.8.80x726dStandard query (0)smtp.fil-net.comA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        May 5, 2021 17:01:59.133631945 CEST8.8.8.8192.168.2.40xbabdNo error (0)doc-10-9k-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                                        May 5, 2021 17:01:59.133631945 CEST8.8.8.8192.168.2.40xbabdNo error (0)googlehosted.l.googleusercontent.com216.58.212.129A (IP address)IN (0x0001)
                                        May 5, 2021 17:03:28.581509113 CEST8.8.8.8192.168.2.40xff76No error (0)smtp.fil-net.com46.16.61.250A (IP address)IN (0x0001)
                                        May 5, 2021 17:03:29.367165089 CEST8.8.8.8192.168.2.40x726dNo error (0)smtp.fil-net.com46.16.61.250A (IP address)IN (0x0001)

                                        HTTPS Packets

                                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                        May 5, 2021 17:01:59.229300976 CEST216.58.212.129443192.168.2.449766CN=*.googleusercontent.com CN=GTS CA 1C3, O=Google Trust Services LLC, C=US CN=GTS Root R1, O=Google Trust Services LLC, C=USCN=GTS CA 1C3, O=Google Trust Services LLC, C=US CN=GTS Root R1, O=Google Trust Services LLC, C=US CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BETue Apr 13 12:41:17 CEST 2021 Thu Aug 13 02:00:42 CEST 2020 Fri Jun 19 02:00:42 CEST 2020Tue Jul 06 12:41:16 CEST 2021 Thu Sep 30 02:00:42 CEST 2027 Fri Jan 28 01:00:42 CET 2028771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                        CN=GTS CA 1C3, O=Google Trust Services LLC, C=USCN=GTS Root R1, O=Google Trust Services LLC, C=USThu Aug 13 02:00:42 CEST 2020Thu Sep 30 02:00:42 CEST 2027
                                        CN=GTS Root R1, O=Google Trust Services LLC, C=USCN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BEFri Jun 19 02:00:42 CEST 2020Fri Jan 28 01:00:42 CET 2028

                                        SMTP Packets

                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        May 5, 2021 17:03:28.999555111 CEST5874977746.16.61.250192.168.2.4220 vxsys-smtpclusterma-05.srv.cat ESMTP
                                        May 5, 2021 17:03:29.495770931 CEST5874977846.16.61.250192.168.2.4220 vxsys-smtpclusterma-03.srv.cat ESMTP
                                        May 5, 2021 17:03:29.496217966 CEST49778587192.168.2.446.16.61.250EHLO 131521
                                        May 5, 2021 17:03:29.579648972 CEST5874977846.16.61.250192.168.2.4250-vxsys-smtpclusterma-03.srv.cat
                                        250-PIPELINING
                                        250-SIZE 47185920
                                        250-ETRN
                                        250-STARTTLS
                                        250-AUTH PLAIN LOGIN CRAM-MD5 DIGEST-MD5
                                        250-ENHANCEDSTATUSCODES
                                        250-8BITMIME
                                        250-DSN
                                        250 CHUNKING
                                        May 5, 2021 17:03:29.579931021 CEST49778587192.168.2.446.16.61.250STARTTLS
                                        May 5, 2021 17:03:29.642256975 CEST5874977846.16.61.250192.168.2.4220 2.0.0 Ready to start TLS

                                        Code Manipulations

                                        Statistics

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:17:01:09
                                        Start date:05/05/2021
                                        Path:C:\Users\user\Desktop\ordine n#U00b0 276.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
                                        Imagebase:0x400000
                                        File size:98304 bytes
                                        MD5 hash:10F03C95BA280CD5A82146269F89CA9D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:Visual Basic
                                        Yara matches:
                                        • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000000.638126535.000000000040C000.00000020.00020000.sdmp, Author: Florian Roth
                                        • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000002.749114091.000000000040C000.00000020.00020000.sdmp, Author: Florian Roth
                                        Reputation:low

                                        General

                                        Start time:17:01:35
                                        Start date:05/05/2021
                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                        Wow64 process (32bit):false
                                        Commandline:'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
                                        Imagebase:0x360000
                                        File size:53248 bytes
                                        MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:17:01:36
                                        Start date:05/05/2021
                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                        Wow64 process (32bit):false
                                        Commandline:'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
                                        Imagebase:0x2d0000
                                        File size:53248 bytes
                                        MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:17:01:36
                                        Start date:05/05/2021
                                        Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\Desktop\ordine n#U00b0 276.exe'
                                        Imagebase:0x880000
                                        File size:53248 bytes
                                        MD5 hash:529695608EAFBED00ACA9E61EF333A7C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.1035317634.000000001DA61000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:high

                                        General

                                        Start time:17:01:37
                                        Start date:05/05/2021
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff724c50000
                                        File size:625664 bytes
                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Disassembly

                                        Code Analysis

                                        Reset < >