Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Malware.AI.4228845530.13946.10796

Overview

General Information

Sample Name:SecuriteInfo.com.Malware.AI.4228845530.13946.10796 (renamed file extension from 10796 to exe)
Analysis ID:412370
MD5:248b7d11fab05df72c28b150af6f2dd8
SHA1:230f7982e0bcf4a0e1e164316d736101bc5b8d5e
SHA256:778487cdb0077cbe811443b5247a8121c5fc7c7e23472c068eee1e41a1476745
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Injects a PE file into a foreign processes
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "sergio.arroyo@kaeiser.comQIErWCn3smtp.kaeiser.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 5 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "sergio.arroyo@kaeiser.comQIErWCn3smtp.kaeiser.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeVirustotal: Detection: 31%Perma Link
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeReversingLabs: Detection: 36%
                      Machine Learning detection for sampleShow sources
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeJoe Sandbox ML: detected
                      Source: 6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49733 -> 208.91.199.224:587
                      Source: global trafficTCP traffic: 192.168.2.5:49733 -> 208.91.199.224:587
                      Source: Joe Sandbox ViewIP Address: 208.91.199.224 208.91.199.224
                      Source: global trafficTCP traffic: 192.168.2.5:49733 -> 208.91.199.224:587
                      Source: unknownDNS traffic detected: queries for: smtp.kaeiser.com
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpString found in binary or memory: http://qdovFN.com
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258242489.0000000002F31000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/1
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/downloads/
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/index_ru.html
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/index_ru.htmlc
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: http://servermanager.miixit.org/report/reporter_index.php?name=
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505677643.0000000003431000.00000004.00000001.sdmpString found in binary or memory: http://smtp.kaeiser.com
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505677643.0000000003431000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505339832.00000000033DF000.00000004.00000001.sdmp, SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000003.462075964.0000000001184000.00000004.00000001.sdmp, SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505810185.0000000003440000.00000004.00000001.sdmpString found in binary or memory: https://6JeA1hPBvojxA7lSjrqA.org
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpString found in binary or memory: https://6JeA1hPBvojxA7lSjrqA.org4
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC5http://servermana
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.257816149.000000000132B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary:

                      barindex
                      PE file contains section with special charsShow sources
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: section name: sBa<03`
                      PE file has nameless sectionsShow sources
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01312D3B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01316D10
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013145E8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013124B8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013118F0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013104E9
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01313738
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_0131B2F0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_0131AD00
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01314500
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_0131455D
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013131B9
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013115D7
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01312464
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013154A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013168A8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01315490
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01316898
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01316B08
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01316670
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01316660
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01316AF8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C99080
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C96525
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C927D8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C90FDD
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C95F88
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C90F9A
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C927B9
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C95F78
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C91E5B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C91E68
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C909C8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C90958
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C91958
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C9215B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C91968
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C92168
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C91018
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C96348
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C9633B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_01460D77
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_01468C58
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_01469F48
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_0146B7B0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_01464A98
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_014651D8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_01467DE0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_014652D8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_014F5520
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_014FB838
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_014F67C0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_018146A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_01814690
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258278831.0000000002F74000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUPUUHYtnpTKoXtyRejHoSmyBkdQcDqfWz.exe4 vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.257261739.0000000000B51000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exeF vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248294877.00000000034EE000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.266244360.0000000005710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.257816149.000000000132B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.259348997.0000000003440000.00000004.00000001.sdmpBinary or memory string: l,\\StringFileInfo\\000004B0\\OriginalFilename vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000004.00000002.252488681.0000000000300000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exeF vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000005.00000000.253243433.00000000003D0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exeF vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000000.254313896.0000000000D40000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exeF vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.499004445.00000000010F8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameUPUUHYtnpTKoXtyRejHoSmyBkdQcDqfWz.exe4 vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.501293215.0000000001450000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.501160686.00000000013E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeBinary or memory string: OriginalFilenameIsolatedStorageSecurityOptions.exeF vs SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: Section: sBa<03` ZLIB complexity 1.00031861323
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/1@2/1
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Malware.AI.4228845530.13946.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeVirustotal: Detection: 31%
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeReversingLabs: Detection: 36%
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe:Zone.IdentifierJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe'
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeUnpacked PE file: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.a90000.0.unpack sBa<03`:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: section name: sBa<03`
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exeStatic PE information: section name:
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_00B3D2F8 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_00B3BF64 push ebp; iretd
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_01310A9D push esi; iretd
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C957BE push cs; ret
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_05C957B4 push cs; ret
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00303622 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00302E27 pushad ; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00303670 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00303658 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00303A5A push ss; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00303BB6 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00303BA4 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_003033A6 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_00303B92 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 4_2_003003D2 push esi; iretd
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D2E27 pushad ; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D3622 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D3670 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D3658 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D3A5A push ss; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D3BB6 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D3BA4 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D33A6 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D3B92 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 5_2_003D03D2 push esi; iretd
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_00D403D2 push esi; iretd
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_00D43B92 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_00D43BB6 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_00D43BA4 push ds; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_00D433A6 push cs; retf
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_00D43658 push cs; retf
                      Source: initial sampleStatic PE information: section name: sBa<03` entropy: 7.9997886445
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Malware.AI.4228845530.13946.exe PID: 4012, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013115D7 rdtsc
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWindow / User API: threadDelayed 2879
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWindow / User API: threadDelayed 6926
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe TID: 3440Thread sleep time: -99464s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe TID: 3328Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe TID: 4196Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe TID: 6508Thread sleep time: -22136092888451448s >= -30000s
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe TID: 6536Thread sleep count: 2879 > 30
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe TID: 6536Thread sleep count: 6926 > 30
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe TID: 6508Thread sleep count: 40 > 30
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeThread delayed: delay time: 99464
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeThread delayed: delay time: 922337203685477
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.508185877.0000000006680000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess information queried: ProcessInformation

                      Anti Debugging:

                      barindex
                      Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013116D0 CheckRemoteDebuggerPresent,
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess queried: DebugPort
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 1_2_013115D7 rdtsc
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeCode function: 6_2_0146D198 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502411458.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502411458.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502411458.0000000001C10000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502411458.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502411458.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Malware.AI.4228845530.13946.exe PID: 4012, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Malware.AI.4228845530.13946.exe PID: 5756, type: MEMORY
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Malware.AI.4228845530.13946.exe PID: 5756, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Malware.AI.4228845530.13946.exe PID: 4012, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Malware.AI.4228845530.13946.exe PID: 5756, type: MEMORY
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.4030b70.2.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Input Capture1Security Software Discovery331Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion141Credentials in Registry1Process Discovery2SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion141Distributed Component Object ModelData from Local System2Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information3LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing13Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 412370 Sample: SecuriteInfo.com.Malware.AI... Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 24 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->24 26 Found malware configuration 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 7 other signatures 2->30 6 SecuriteInfo.com.Malware.AI.4228845530.13946.exe 3 2->6         started        process3 file4 18 SecuriteInfo.com.M...45530.13946.exe.log, ASCII 6->18 dropped 32 Detected unpacking (changes PE section rights) 6->32 34 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->34 36 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->36 38 2 other signatures 6->38 10 SecuriteInfo.com.Malware.AI.4228845530.13946.exe 2 6->10         started        14 SecuriteInfo.com.Malware.AI.4228845530.13946.exe 6->14         started        16 SecuriteInfo.com.Malware.AI.4228845530.13946.exe 6->16         started        signatures5 process6 dnsIp7 20 smtp.kaeiser.com 10->20 22 us2.smtp.mailhostbox.com 208.91.199.224, 49733, 587 PUBLIC-DOMAIN-REGISTRYUS United States 10->22 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->40 42 Tries to steal Mail credentials (via file access) 10->42 44 Tries to harvest and steal ftp login credentials 10->44 46 Tries to harvest and steal browser information (history, passwords, etc) 10->46 signatures8

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Malware.AI.4228845530.13946.exe32%VirustotalBrowse
                      SecuriteInfo.com.Malware.AI.4228845530.13946.exe36%ReversingLabsWin32.Trojan.Wacatac
                      SecuriteInfo.com.Malware.AI.4228845530.13946.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      1.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.a90000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.SecuriteInfo.com.Malware.AI.4228845530.13946.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      smtp.kaeiser.com0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://checkip.dyndns.org/0%VirustotalBrowse
                      http://checkip.dyndns.org/0%Avira URL Cloudsafe
                      https://6JeA1hPBvojxA7lSjrqA.org40%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://6JeA1hPBvojxA7lSjrqA.org0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.html0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.htmlc0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/report/reporter_index.php?name=0%Avira URL Cloudsafe
                      http://qdovFN.com0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://smtp.kaeiser.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://servermanager.miixit.org/downloads/0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/hits/hit_index.php?k=0%Avira URL Cloudsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us2.smtp.mailhostbox.com
                      208.91.199.224
                      truefalse
                        high
                        smtp.kaeiser.com
                        unknown
                        unknowntrueunknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.org/SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://us2.smtp.mailhostbox.comSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505677643.0000000003431000.00000004.00000001.sdmpfalse
                          high
                          https://6JeA1hPBvojxA7lSjrqA.org4SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://6JeA1hPBvojxA7lSjrqA.orgSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505339832.00000000033DF000.00000004.00000001.sdmp, SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000003.462075964.0000000001184000.00000004.00000001.sdmp, SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505810185.0000000003440000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPCSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                            high
                            http://servermanager.miixit.org/index_ru.htmlSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://servermanager.miixit.org/index_ru.htmlcSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://servermanager.miixit.org/report/reporter_index.php?name=SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://qdovFN.comSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://servermanager.miixit.org/1SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ipify.org%GETMozilla/5.0SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            low
                            http://smtp.kaeiser.comSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.505677643.0000000003431000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258242489.0000000002F31000.00000004.00000001.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmpfalse
                                high
                                https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC5http://servermanaSecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                                  high
                                  http://servermanager.miixit.org/downloads/SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://servermanager.miixit.org/hits/hit_index.php?k=SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000001.00000003.248737778.000000000381A000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.ipify.org%$SecuriteInfo.com.Malware.AI.4228845530.13946.exe, 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  208.91.199.224
                                  us2.smtp.mailhostbox.comUnited States
                                  394695PUBLIC-DOMAIN-REGISTRYUSfalse

                                  General Information

                                  Joe Sandbox Version:32.0.0 Black Diamond
                                  Analysis ID:412370
                                  Start date:12.05.2021
                                  Start time:16:46:33
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 9m 52s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:SecuriteInfo.com.Malware.AI.4228845530.13946.10796 (renamed file extension from 10796 to exe)
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:28
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@7/1@2/1
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 3.7% (good quality ratio 2%)
                                  • Quality average: 36.3%
                                  • Quality standard deviation: 38.2%
                                  HCA Information:
                                  • Successful, ratio: 97%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  Warnings:
                                  Show All
                                  • Excluded IPs from analysis (whitelisted): 93.184.220.29, 104.42.151.234, 92.122.145.220, 104.43.193.48, 168.61.161.212, 184.30.20.56, 20.82.210.154, 92.122.213.247, 92.122.213.194, 20.54.26.129
                                  • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, fs.microsoft.com, ris-prod.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, ocsp.digicert.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  16:47:34API Interceptor669x Sleep call for process: SecuriteInfo.com.Malware.AI.4228845530.13946.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  208.91.199.224PDF.9066721066.exeGet hashmaliciousBrowse
                                    Payment Advice Note from 10.05.2021 to 608760.exeGet hashmaliciousBrowse
                                      Quotation..exeGet hashmaliciousBrowse
                                        Quotation.exeGet hashmaliciousBrowse
                                          QUOTATION ORDER.exeGet hashmaliciousBrowse
                                            Request Sample products.exeGet hashmaliciousBrowse
                                              Quotation RFQ8116300.exeGet hashmaliciousBrowse
                                                New Enquiry 200567.exeGet hashmaliciousBrowse
                                                  7UKtv01ZdPSbdAD.exeGet hashmaliciousBrowse
                                                    Order Confirmation.exeGet hashmaliciousBrowse
                                                      Swift Copy.xlsxGet hashmaliciousBrowse
                                                        LM Approved Invoices 06052021.docGet hashmaliciousBrowse
                                                          ADVICE84857584489393.exeGet hashmaliciousBrowse
                                                            file.exeGet hashmaliciousBrowse
                                                              1STyZQU31dWqcMq.exeGet hashmaliciousBrowse
                                                                1g1NLI6i33.exeGet hashmaliciousBrowse
                                                                  PO.xlsxGet hashmaliciousBrowse
                                                                    Purchase Orde.pdf.exeGet hashmaliciousBrowse
                                                                      LM Approved Invoice-03-05-2021.docGet hashmaliciousBrowse
                                                                        REQUEST FOR PRICE QUOTE - URGENT.exeGet hashmaliciousBrowse

                                                                          Domains

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          us2.smtp.mailhostbox.compresupuesto.xlsxGet hashmaliciousBrowse
                                                                          • 208.91.199.225
                                                                          shipping docs and BL_pdf.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          PDF.9066721066.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.224
                                                                          Payment Advice Note from 10.05.2021 to 608760.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.224
                                                                          RFQ-20283H.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          BTC-2021.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.225
                                                                          Copia de pago.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.225
                                                                          NEW PI#001890576.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.223
                                                                          PO 4500379537.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.225
                                                                          B5Cg5YZIzp.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.223
                                                                          PO 2345566 hisob-faktura.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          Quotation..exeGet hashmaliciousBrowse
                                                                          • 208.91.199.223
                                                                          RFQ-Quotation..exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          Quotation.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.224
                                                                          QUOTATION ORDER.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.224
                                                                          purchase order.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.223
                                                                          RFQ_SGCCUP_24 590 34 532 -11052021.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          Request Sample products.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          QTY-3322.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          Request Sample products.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.224

                                                                          ASN

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          PUBLIC-DOMAIN-REGISTRYUSLetter of Demand.docGet hashmaliciousBrowse
                                                                          • 103.21.59.173
                                                                          7b4NmGxyY2.exeGet hashmaliciousBrowse
                                                                          • 162.215.241.145
                                                                          catalog-1908475637.xlsGet hashmaliciousBrowse
                                                                          • 199.79.62.12
                                                                          catalog-1908475637.xlsGet hashmaliciousBrowse
                                                                          • 199.79.62.12
                                                                          INV74321.exeGet hashmaliciousBrowse
                                                                          • 119.18.54.126
                                                                          NAVTECO_R1_10_05_2021,pdf.exeGet hashmaliciousBrowse
                                                                          • 116.206.104.92
                                                                          #10052021.exeGet hashmaliciousBrowse
                                                                          • 116.206.104.66
                                                                          shipping docs and BL_pdf.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          PDF.9066721066.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.224
                                                                          Payment Advice Note from 10.05.2021 to 608760.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.224
                                                                          551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                                                          • 162.222.225.153
                                                                          551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                                                          • 162.222.225.153
                                                                          export of document 555091.xlsmGet hashmaliciousBrowse
                                                                          • 103.21.58.29
                                                                          RFQ-20283H.exeGet hashmaliciousBrowse
                                                                          • 208.91.198.143
                                                                          BTC-2021.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.225
                                                                          invoice 85046.xlsmGet hashmaliciousBrowse
                                                                          • 103.21.58.29
                                                                          copy of invoice 4347.xlsmGet hashmaliciousBrowse
                                                                          • 103.21.58.29
                                                                          Copia de pago.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.225
                                                                          NEW PI#001890576.exeGet hashmaliciousBrowse
                                                                          • 208.91.199.223
                                                                          bill 04050.xlsmGet hashmaliciousBrowse
                                                                          • 103.21.59.208

                                                                          JA3 Fingerprints

                                                                          No context

                                                                          Dropped Files

                                                                          No context

                                                                          Created / dropped Files

                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Malware.AI.4228845530.13946.exe.log
                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):1314
                                                                          Entropy (8bit):5.350128552078965
                                                                          Encrypted:false
                                                                          SSDEEP:24:ML9E4Ks2f84jE4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MxHKXfvjHKx1qHiYHKhQnoPtHoxHhAHR
                                                                          MD5:8198C64CE0786EABD4C792E7E6FC30E5
                                                                          SHA1:71E1676126F4616B18C751A0A775B2D64944A15A
                                                                          SHA-256:C58018934011086A883D1D56B21F6C1916B1CD83206ADD1865C9BDD29DADCBC4
                                                                          SHA-512:EE293C0F88A12AB10041F66DDFAE89BC11AB3B3AAD8604F1A418ABE43DF0980245C3B7F8FEB709AEE8E9474841A280E073EC063045EA39948E853AA6B4EC0FB0
                                                                          Malicious:true
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                                          Static File Info

                                                                          General

                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):7.76610281911688
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                          File name:SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          File size:934400
                                                                          MD5:248b7d11fab05df72c28b150af6f2dd8
                                                                          SHA1:230f7982e0bcf4a0e1e164316d736101bc5b8d5e
                                                                          SHA256:778487cdb0077cbe811443b5247a8121c5fc7c7e23472c068eee1e41a1476745
                                                                          SHA512:52aade22e310127a1e4e809b2902b59cbd88de5b298cb17caa3c78ba39fa09bcc25187a63b8ed4d33d8d0060869a1f89c44d9e25cc51338a0b976083a5a900c5
                                                                          SSDEEP:24576:0bnpWiHvIlK3sJecpFQDu4hV342SqtkFWhoTa9mmZ7:0bnUzQ+aDHV3aFWy6mmZ
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,..`..............P......|............... ....@.. ....................................@................................

                                                                          File Icon

                                                                          Icon Hash:8a8ccae6e0fcc4aa

                                                                          Static PE Info

                                                                          General

                                                                          Entrypoint:0x4ea00a
                                                                          Entrypoint Section:
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                          Time Stamp:0x609B842C [Wed May 12 07:30:52 2021 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:v4.0.30319
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                          Entrypoint Preview

                                                                          Instruction
                                                                          jmp dword ptr [004EA000h]
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al

                                                                          Data Directories

                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc08dc0x4f.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x1b130.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0xea0000x8
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0xc00000x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                          Sections

                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          sBa<03`0x20000xbc6b80xbc800False1.00031861323data7.9997886445IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                          .text0xc00000xbec00xc000False0.443725585938data5.98422695135IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0xcc0000x1b1300x1b200False0.123334893433data3.48672876978IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0xe80000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          0xea0000x100x200False0.044921875dBase III DBT, version number 0, next free block index 7887520.142635768149IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ

                                                                          Resources

                                                                          NameRVASizeTypeLanguageCountry
                                                                          RT_ICON0xcc2500x1b5fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                          RT_ICON0xcddb00x10828dBase III DBT, version number 0, next free block index 40
                                                                          RT_ICON0xde5d80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                          RT_ICON0xe28000x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                          RT_ICON0xe4da80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                          RT_ICON0xe5e500x468GLS_BINARY_LSB_FIRST
                                                                          RT_GROUP_ICON0xe62b80x5adata
                                                                          RT_GROUP_ICON0xe63140x14data
                                                                          RT_VERSION0xe63280x39cdata
                                                                          RT_MANIFEST0xe66c40xa65XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                          Imports

                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain

                                                                          Version Infos

                                                                          DescriptionData
                                                                          Translation0x0000 0x04b0
                                                                          LegalCopyrightCopyright 2013
                                                                          Assembly Version3.0.0.0
                                                                          InternalNameIsolatedStorageSecurityOptions.exe
                                                                          FileVersion3.0.0.0
                                                                          CompanyName
                                                                          LegalTrademarks
                                                                          Comments
                                                                          ProductNameServerManager_Core
                                                                          ProductVersion3.0.0.0
                                                                          FileDescriptionServerManager_Core
                                                                          OriginalFilenameIsolatedStorageSecurityOptions.exe

                                                                          Network Behavior

                                                                          Snort IDS Alerts

                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                          05/12/21-16:49:21.211208TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49733587192.168.2.5208.91.199.224

                                                                          Network Port Distribution

                                                                          TCP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          May 12, 2021 16:49:19.438030958 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:19.602700949 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:19.602816105 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:20.182816982 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:20.183258057 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:20.346558094 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:20.346596956 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:20.349409103 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:20.513592005 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:20.514242887 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:20.679681063 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:20.680565119 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:20.844995022 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:20.845446110 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:21.041570902 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:21.042124033 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:21.205835104 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:21.211208105 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:21.211504936 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:21.211669922 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:21.211858034 CEST49733587192.168.2.5208.91.199.224
                                                                          May 12, 2021 16:49:21.374861002 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:21.375021935 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:21.473221064 CEST58749733208.91.199.224192.168.2.5
                                                                          May 12, 2021 16:49:21.525196075 CEST49733587192.168.2.5208.91.199.224

                                                                          UDP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          May 12, 2021 16:47:17.762149096 CEST53620608.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:17.777302027 CEST6180553192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:17.826127052 CEST53618058.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:18.402791023 CEST5479553192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:18.452846050 CEST53547958.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:18.595149040 CEST4955753192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:18.662967920 CEST53495578.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:19.546247959 CEST6173353192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:19.595191956 CEST53617338.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:20.512152910 CEST6544753192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:20.560919046 CEST53654478.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:21.739219904 CEST5244153192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:21.787822962 CEST53524418.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:23.225873947 CEST6217653192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:23.274524927 CEST53621768.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:25.415198088 CEST5959653192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:25.463933945 CEST53595968.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:26.651551008 CEST6529653192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:26.703161955 CEST53652968.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:30.238341093 CEST6318353192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:30.287147045 CEST53631838.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:31.211246967 CEST6015153192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:31.274061918 CEST53601518.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:32.141752005 CEST5696953192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:32.190381050 CEST53569698.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:42.827264071 CEST5516153192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:42.890696049 CEST53551618.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:49.601633072 CEST5475753192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:49.661398888 CEST53547578.8.8.8192.168.2.5
                                                                          May 12, 2021 16:47:56.964221954 CEST4999253192.168.2.58.8.8.8
                                                                          May 12, 2021 16:47:57.026830912 CEST53499928.8.8.8192.168.2.5
                                                                          May 12, 2021 16:48:28.179665089 CEST6007553192.168.2.58.8.8.8
                                                                          May 12, 2021 16:48:28.254879951 CEST53600758.8.8.8192.168.2.5
                                                                          May 12, 2021 16:48:31.128184080 CEST5501653192.168.2.58.8.8.8
                                                                          May 12, 2021 16:48:31.186876059 CEST53550168.8.8.8192.168.2.5
                                                                          May 12, 2021 16:48:39.086479902 CEST6434553192.168.2.58.8.8.8
                                                                          May 12, 2021 16:48:39.148816109 CEST53643458.8.8.8192.168.2.5
                                                                          May 12, 2021 16:48:52.079786062 CEST5712853192.168.2.58.8.8.8
                                                                          May 12, 2021 16:48:52.147031069 CEST53571288.8.8.8192.168.2.5
                                                                          May 12, 2021 16:49:11.718720913 CEST5479153192.168.2.58.8.8.8
                                                                          May 12, 2021 16:49:11.776118040 CEST53547918.8.8.8192.168.2.5
                                                                          May 12, 2021 16:49:14.520978928 CEST5046353192.168.2.58.8.8.8
                                                                          May 12, 2021 16:49:14.589231014 CEST53504638.8.8.8192.168.2.5
                                                                          May 12, 2021 16:49:19.059950113 CEST5039453192.168.2.58.8.8.8
                                                                          May 12, 2021 16:49:19.249295950 CEST53503948.8.8.8192.168.2.5
                                                                          May 12, 2021 16:49:19.282136917 CEST5853053192.168.2.58.8.8.8
                                                                          May 12, 2021 16:49:19.339981079 CEST53585308.8.8.8192.168.2.5

                                                                          DNS Queries

                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                          May 12, 2021 16:49:19.059950113 CEST192.168.2.58.8.8.80x2babStandard query (0)smtp.kaeiser.comA (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.282136917 CEST192.168.2.58.8.8.80x85a3Standard query (0)smtp.kaeiser.comA (IP address)IN (0x0001)

                                                                          DNS Answers

                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                          May 12, 2021 16:49:19.249295950 CEST8.8.8.8192.168.2.50x2babNo error (0)smtp.kaeiser.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                                                          May 12, 2021 16:49:19.249295950 CEST8.8.8.8192.168.2.50x2babNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.249295950 CEST8.8.8.8192.168.2.50x2babNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.249295950 CEST8.8.8.8192.168.2.50x2babNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.249295950 CEST8.8.8.8192.168.2.50x2babNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.339981079 CEST8.8.8.8192.168.2.50x85a3No error (0)smtp.kaeiser.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                                                          May 12, 2021 16:49:19.339981079 CEST8.8.8.8192.168.2.50x85a3No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.339981079 CEST8.8.8.8192.168.2.50x85a3No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.339981079 CEST8.8.8.8192.168.2.50x85a3No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                          May 12, 2021 16:49:19.339981079 CEST8.8.8.8192.168.2.50x85a3No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)

                                                                          SMTP Packets

                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                          May 12, 2021 16:49:20.182816982 CEST58749733208.91.199.224192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                          May 12, 2021 16:49:20.183258057 CEST49733587192.168.2.5208.91.199.224EHLO 124406
                                                                          May 12, 2021 16:49:20.346596956 CEST58749733208.91.199.224192.168.2.5250-us2.outbound.mailhostbox.com
                                                                          250-PIPELINING
                                                                          250-SIZE 41648128
                                                                          250-VRFY
                                                                          250-ETRN
                                                                          250-STARTTLS
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-AUTH=PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 DSN
                                                                          May 12, 2021 16:49:20.349409103 CEST49733587192.168.2.5208.91.199.224AUTH login c2VyZ2lvLmFycm95b0BrYWVpc2VyLmNvbQ==
                                                                          May 12, 2021 16:49:20.513592005 CEST58749733208.91.199.224192.168.2.5334 UGFzc3dvcmQ6
                                                                          May 12, 2021 16:49:20.679681063 CEST58749733208.91.199.224192.168.2.5235 2.7.0 Authentication successful
                                                                          May 12, 2021 16:49:20.680565119 CEST49733587192.168.2.5208.91.199.224MAIL FROM:<sergio.arroyo@kaeiser.com>
                                                                          May 12, 2021 16:49:20.844995022 CEST58749733208.91.199.224192.168.2.5250 2.1.0 Ok
                                                                          May 12, 2021 16:49:20.845446110 CEST49733587192.168.2.5208.91.199.224RCPT TO:<sergio.arroyo@kaeiser.com>
                                                                          May 12, 2021 16:49:21.041570902 CEST58749733208.91.199.224192.168.2.5250 2.1.5 Ok
                                                                          May 12, 2021 16:49:21.042124033 CEST49733587192.168.2.5208.91.199.224DATA
                                                                          May 12, 2021 16:49:21.205835104 CEST58749733208.91.199.224192.168.2.5354 End data with <CR><LF>.<CR><LF>
                                                                          May 12, 2021 16:49:21.211858034 CEST49733587192.168.2.5208.91.199.224.
                                                                          May 12, 2021 16:49:21.473221064 CEST58749733208.91.199.224192.168.2.5250 2.0.0 Ok: queued as EE2481C20C4

                                                                          Code Manipulations

                                                                          Statistics

                                                                          Behavior

                                                                          Click to jump to process

                                                                          System Behavior

                                                                          General

                                                                          Start time:16:47:26
                                                                          Start date:12/05/2021
                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe'
                                                                          Imagebase:0xa90000
                                                                          File size:934400 bytes
                                                                          MD5 hash:248B7D11FAB05DF72C28B150AF6F2DD8
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.258294495.0000000002F83000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.260145188.0000000003F85000.00000004.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          General

                                                                          Start time:16:47:36
                                                                          Start date:12/05/2021
                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          Imagebase:0x240000
                                                                          File size:934400 bytes
                                                                          MD5 hash:248B7D11FAB05DF72C28B150AF6F2DD8
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low

                                                                          General

                                                                          Start time:16:47:36
                                                                          Start date:12/05/2021
                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          Imagebase:0x310000
                                                                          File size:934400 bytes
                                                                          MD5 hash:248B7D11FAB05DF72C28B150AF6F2DD8
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low

                                                                          General

                                                                          Start time:16:47:37
                                                                          Start date:12/05/2021
                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Malware.AI.4228845530.13946.exe
                                                                          Imagebase:0xc80000
                                                                          File size:934400 bytes
                                                                          MD5 hash:248B7D11FAB05DF72C28B150AF6F2DD8
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.502628732.0000000003181000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.498013758.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          Disassembly

                                                                          Code Analysis

                                                                          Reset < >