Loading ...

Play interactive tourEdit tour

Analysis Report All details.exe

Overview

General Information

Sample Name:All details.exe
Analysis ID:412443
MD5:c52453368b884441af3614334842a4b5
SHA1:a6794ed06765806f4130265001e41e7ee395c342
SHA256:360bdb5ece5a96f0f7f6100dd04b1213ca18c3da3521cda91b30c467066e4a49
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • All details.exe (PID: 1288 cmdline: 'C:\Users\user\Desktop\All details.exe' MD5: C52453368B884441AF3614334842A4B5)
    • schtasks.exe (PID: 3980 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\nbSEjaNCrLELYl' /XML 'C:\Users\user\AppData\Local\Temp\tmp90EF.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 1200 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "FTP", "FTP Info": "ftp://files.000webhost.com/zincocomputer147"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            5.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              5.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.2.All details.exe.36cd460.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.All details.exe.36cd460.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    1.2.All details.exe.36cd460.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\All details.exe' , ParentImage: C:\Users\user\Desktop\All details.exe, ParentProcessId: 1288, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 1200

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Info": "ftp://files.000webhost.com/zincocomputer147"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exeReversingLabs: Detection: 46%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: All details.exeVirustotal: Detection: 27%Perma Link
                      Source: All details.exeReversingLabs: Detection: 46%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: All details.exeJoe Sandbox ML: detected
                      Source: 5.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: All details.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: All details.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\XAtOhiiEmr\src\obj\Debug\ScopelessEnumAttribute.pdb( source: All details.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\XAtOhiiEmr\src\obj\Debug\ScopelessEnumAttribute.pdb source: All details.exe

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.3:49740 -> 145.14.144.54:21
                      Source: TrafficSnort IDS: 2029928 ET TROJAN AgentTesla HTML System Info Report Exfil via FTP 192.168.2.3:49741 -> 145.14.144.54:54705
                      Source: global trafficTCP traffic: 192.168.2.3:49741 -> 145.14.144.54:54705
                      Source: Joe Sandbox ViewIP Address: 145.14.144.54 145.14.144.54
                      Source: Joe Sandbox ViewASN Name: AWEXUS AWEXUS
                      Source: unknownFTP traffic detected: 145.14.144.54:21 -> 192.168.2.3:49740 220 ProFTPD Server (000webhost.com) [::ffff:145.14.144.54]
                      Source: unknownDNS traffic detected: queries for: files.000webhost.com
                      Source: RegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpString found in binary or memory: ftp://files.000webhost.com/zincocomputer147STORLengthWriteCloseGetBytesOpera
                      Source: RegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpString found in binary or memory: http://CqZTYA.com
                      Source: RegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: All details.exeString found in binary or memory: http://checkip.dyndns.org/
                      Source: RegSvcs.exe, 00000005.00000002.485377303.00000000034E1000.00000004.00000001.sdmpString found in binary or memory: http://files.000webhost.com
                      Source: All details.exe, 00000001.00000002.227146994.0000000002621000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.485338104.00000000034D3000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/E
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/downloads/
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=1
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.html
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.htmlk
                      Source: All details.exeString found in binary or memory: http://servermanager.miixit.org/report/reporter_index.php?name=
                      Source: RegSvcs.exe, 00000005.00000002.485377303.00000000034E1000.00000004.00000001.sdmpString found in binary or memory: http://us-east-1.route-1000.000webhost.awex.io
                      Source: RegSvcs.exe, 00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmpString found in binary or memory: https://Y8cdnuVUpcPEsq.com
                      Source: RegSvcs.exe, 00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmpString found in binary or memory: https://Y8cdnuVUpcPEsq.comL
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: All details.exeString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC
                      Source: All details.exe, 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676C908 BasepProcessInvalidImage,KiUserExceptionDispatcher,RegisterMessagePumpHook,wvsprintfW,wvsprintfW,wvsprintfW,GetClipboardData,GetClipboardData,GetClipboardData,GetCalendarInfoA,KiUserExceptionDispatcher,NotifyUILanguageChange,KiUserExceptionDispatcher,IsCalendarLeapMonth,LdrInitializeThunk,SetUserGeoID,UserLpkPSMTextOut,

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 5.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bF52F2392u002d8C75u002d4729u002dA1E6u002d025BFAA162F9u007d/CB8ACA7Au002d9CEBu002d462Du002dA49Bu002dF669480A59B6.csLarge array initialization: .cctor: array initializer size 11932
                      Source: C:\Users\user\Desktop\All details.exeCode function: 1_2_025FC2B0
                      Source: C:\Users\user\Desktop\All details.exeCode function: 1_2_025F9968
                      Source: C:\Users\user\Desktop\All details.exeCode function: 1_2_04C34958
                      Source: C:\Users\user\Desktop\All details.exeCode function: 1_2_04C3AAD0
                      Source: C:\Users\user\Desktop\All details.exeCode function: 1_2_04C38470
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A547A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A55473
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A53CCC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A54710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A54773
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A546B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A546D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_01A5D661
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_06766508
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_06766850
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_067690D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_06767120
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exe 360BDB5ECE5A96F0F7F6100DD04B1213CA18C3DA3521CDA91B30C467066E4A49
                      Source: All details.exeBinary or memory string: OriginalFilename vs All details.exe
                      Source: All details.exe, 00000001.00000002.231785531.000000000B4E0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs All details.exe
                      Source: All details.exe, 00000001.00000002.231001702.0000000004C40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs All details.exe
                      Source: All details.exe, 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTGqXBSLBNqFAlVDcDrdeyUgg.exe4 vs All details.exe
                      Source: All details.exe, 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs All details.exe
                      Source: All details.exe, 00000001.00000002.227258291.00000000026B9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs All details.exe
                      Source: All details.exe, 00000001.00000002.231918824.000000000B5E0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs All details.exe
                      Source: All details.exe, 00000001.00000002.231918824.000000000B5E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs All details.exe
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameScopelessEnumAttribute.exeF vs All details.exe
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: l,\\StringFileInfo\\000004B0\\OriginalFilename vs All details.exe
                      Source: All details.exeBinary or memory string: OriginalFilenameScopelessEnumAttribute.exeF vs All details.exe
                      Source: All details.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: All details.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: nbSEjaNCrLELYl.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 5.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 5.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@2/1
                      Source: C:\Users\user\Desktop\All details.exeFile created: C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1968:120:WilError_01
                      Source: C:\Users\user\Desktop\All details.exeFile created: C:\Users\user\AppData\Local\Temp\tmp90EF.tmpJump to behavior
                      Source: All details.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\All details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\All details.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\All details.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: All details.exeVirustotal: Detection: 27%
                      Source: All details.exeReversingLabs: Detection: 46%
                      Source: C:\Users\user\Desktop\All details.exeFile read: C:\Users\user\Desktop\All details.exe:Zone.IdentifierJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\All details.exe 'C:\Users\user\Desktop\All details.exe'
                      Source: C:\Users\user\Desktop\All details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\nbSEjaNCrLELYl' /XML 'C:\Users\user\AppData\Local\Temp\tmp90EF.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\All details.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\All details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\nbSEjaNCrLELYl' /XML 'C:\Users\user\AppData\Local\Temp\tmp90EF.tmp'
                      Source: C:\Users\user\Desktop\All details.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\All details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Users\user\Desktop\All details.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: All details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: All details.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: All details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\XAtOhiiEmr\src\obj\Debug\ScopelessEnumAttribute.pdb( source: All details.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\XAtOhiiEmr\src\obj\Debug\ScopelessEnumAttribute.pdb source: All details.exe
                      Source: C:\Users\user\Desktop\All details.exeCode function: 1_2_025F04D0 push C03300BBh; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676EF1A push eax; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676213F push ecx; retf 0005h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676213F push edi; retf 0005h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676219F push eax; retf 0005h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676219F push ebp; retf 0005h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676519C push edi; retf 0005h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676218F push ebp; retf 0005h
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.89003850414
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.89003850414
                      Source: C:\Users\user\Desktop\All details.exeFile created: C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\All details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\nbSEjaNCrLELYl' /XML 'C:\Users\user\AppData\Local\Temp\tmp90EF.tmp'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\All details.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: All details.exe PID: 1288, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\All details.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\All details.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3295
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6527
                      Source: C:\Users\user\Desktop\All details.exe TID: 3888Thread sleep time: -99678s >= -30000s
                      Source: C:\Users\user\Desktop\All details.exe TID: 908Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\All details.exeThread delayed: delay time: 99678
                      Source: C:\Users\user\Desktop\All details.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: RegSvcs.exe, 00000005.00000002.489993396.0000000006400000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: RegSvcs.exe, 00000005.00000002.489993396.0000000006400000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: RegSvcs.exe, 00000005.00000002.489993396.0000000006400000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: All details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: RegSvcs.exe, 00000005.00000002.490227541.0000000006562000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: RegSvcs.exe, 00000005.00000002.489993396.0000000006400000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0676C908 BasepProcessInvalidImage,KiUserExceptionDispatcher,RegisterMessagePumpHook,wvsprintfW,wvsprintfW,wvsprintfW,GetClipboardData,GetClipboardData,GetClipboardData,GetCalendarInfoA,KiUserExceptionDispatcher,NotifyUILanguageChange,KiUserExceptionDispatcher,IsCalendarLeapMonth,LdrInitializeThunk,SetUserGeoID,UserLpkPSMTextOut,
                      Source: C:\Users\user\Desktop\All details.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\All details.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and write
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\All details.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\All details.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                      Source: C:\Users\user\Desktop\All details.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                      Source: C:\Users\user\Desktop\All details.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000
                      Source: C:\Users\user\Desktop\All details.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000
                      Source: C:\Users\user\Desktop\All details.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1179008
                      Source: C:\Users\user\Desktop\All details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\nbSEjaNCrLELYl' /XML 'C:\Users\user\AppData\Local\Temp\tmp90EF.tmp'
                      Source: C:\Users\user\Desktop\All details.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: RegSvcs.exe, 00000005.00000002.482950921.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: RegSvcs.exe, 00000005.00000002.482950921.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 00000005.00000002.482950921.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 00000005.00000002.482950921.0000000001C70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\All details.exeQueries volume information: C:\Users\user\Desktop\All details.exe VolumeInformation
                      Source: C:\Users\user\Desktop\All details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\All details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\All details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\All details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\All details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_06765594 GetUserNameW,
                      Source: C:\Users\user\Desktop\All details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1200, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: All details.exe PID: 1288, type: MEMORY
                      Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1200, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1200, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: All details.exe PID: 1288, type: MEMORY
                      Source: Yara matchFile source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.All details.exe.36cd460.3.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection312Disable or Modify Tools1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Alternative Protocol1Encrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery114SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSQuery Registry1Distributed Component Object ModelClipboard Data1Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery321SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncVirtualization/Sandbox Evasion141Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      All details.exe28%VirustotalBrowse
                      All details.exe47%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      All details.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exe47%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      us-east-1.route-1000.000webhost.awex.io1%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://checkip.dyndns.org/0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://Y8cdnuVUpcPEsq.com0%Avira URL Cloudsafe
                      http://us-east-1.route-1000.000webhost.awex.io0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/hits/hit_index.php?k=10%Avira URL Cloudsafe
                      http://servermanager.miixit.org/E0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.html0%Avira URL Cloudsafe
                      http://CqZTYA.com0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/report/reporter_index.php?name=0%Avira URL Cloudsafe
                      https://Y8cdnuVUpcPEsq.comL0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.htmlk0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://servermanager.miixit.org/downloads/0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/hits/hit_index.php?k=0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us-east-1.route-1000.000webhost.awex.io
                      145.14.144.54
                      truetrueunknown
                      files.000webhost.com
                      unknown
                      unknownfalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSRegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.org/All details.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://files.000webhost.comRegSvcs.exe, 00000005.00000002.485377303.00000000034E1000.00000004.00000001.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://Y8cdnuVUpcPEsq.comRegSvcs.exe, 00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://us-east-1.route-1000.000webhost.awex.ioRegSvcs.exe, 00000005.00000002.485377303.00000000034E1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://servermanager.miixit.org/hits/hit_index.php?k=1All details.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPCAll details.exefalse
                            high
                            http://servermanager.miixit.org/EAll details.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://servermanager.miixit.org/index_ru.htmlAll details.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://CqZTYA.comRegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://servermanager.miixit.org/report/reporter_index.php?name=All details.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            https://Y8cdnuVUpcPEsq.comLRegSvcs.exe, 00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://servermanager.miixit.org/All details.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAll details.exe, 00000001.00000002.227146994.0000000002621000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.485338104.00000000034D3000.00000004.00000001.sdmpfalse
                              high
                              http://servermanager.miixit.org/index_ru.htmlkAll details.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipAll details.exe, 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, RegSvcs.exe, 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              ftp://files.000webhost.com/zincocomputer147STORLengthWriteCloseGetBytesOperaRegSvcs.exe, 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmpfalse
                                high
                                https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssAll details.exe, 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmpfalse
                                  high
                                  http://servermanager.miixit.org/downloads/All details.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://servermanager.miixit.org/hits/hit_index.php?k=All details.exefalse
                                  • Avira URL Cloud: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  145.14.144.54
                                  us-east-1.route-1000.000webhost.awex.ioNetherlands
                                  204915AWEXUStrue

                                  General Information

                                  Joe Sandbox Version:32.0.0 Black Diamond
                                  Analysis ID:412443
                                  Start date:12.05.2021
                                  Start time:17:45:35
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 56s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:All details.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:27
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@6/4@2/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Excluded IPs from analysis (whitelisted): 13.64.90.137, 92.122.145.220, 104.42.151.234, 184.30.24.56, 20.82.209.183, 92.122.213.194, 92.122.213.247, 2.20.143.16, 2.20.142.209, 20.54.26.129, 20.82.210.154
                                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  17:46:29API Interceptor1x Sleep call for process: All details.exe modified
                                  17:46:47API Interceptor739x Sleep call for process: RegSvcs.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  145.14.144.54All details.exeGet hashmaliciousBrowse
                                    Documents.exeGet hashmaliciousBrowse
                                      documents.exeGet hashmaliciousBrowse
                                        Messages Alert.exeGet hashmaliciousBrowse
                                          Additional documents.exeGet hashmaliciousBrowse
                                            Complaint About Your Company.exeGet hashmaliciousBrowse
                                              The enclosed resume.exeGet hashmaliciousBrowse

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                us-east-1.route-1000.000webhost.awex.ioUrgent Attention Required.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                DOCUMENTS.exeGet hashmaliciousBrowse
                                                • 145.14.145.177
                                                Naukri Messages Alert.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                Documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.145.180
                                                Documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                Documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                DOCUMENTS.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                DOCUMENTS.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.145.177
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                Documents.exeGet hashmaliciousBrowse
                                                • 145.14.144.54
                                                Document Submission.exeGet hashmaliciousBrowse
                                                • 145.14.145.180
                                                All list and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                Additional documents.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                documents.exeGet hashmaliciousBrowse
                                                • 145.14.144.54
                                                Sushant Desai cv-.pdf.exeGet hashmaliciousBrowse
                                                • 145.14.145.180
                                                Messages Alert.exeGet hashmaliciousBrowse
                                                • 145.14.144.54

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                AWEXUSAll details.exeGet hashmaliciousBrowse
                                                • 145.14.144.54
                                                Urgent Attention Required.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                Z4uLK26mIK.exeGet hashmaliciousBrowse
                                                • 145.14.145.148
                                                DOCUMENTS.exeGet hashmaliciousBrowse
                                                • 145.14.145.177
                                                nb3WueUqUD.exeGet hashmaliciousBrowse
                                                • 145.14.144.105
                                                Naukri Messages Alert.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                Documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.145.180
                                                Documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                bootlocker.exeGet hashmaliciousBrowse
                                                • 153.92.0.100
                                                Documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                VESSELS DETAILS.exeGet hashmaliciousBrowse
                                                • 153.92.0.100
                                                04721BFDE5ECE7D75CE90D7D09DDCC71028B26F229038.exeGet hashmaliciousBrowse
                                                • 145.14.144.143
                                                04721BFDE5ECE7D75CE90D7D09DDCC71028B26F229038.exeGet hashmaliciousBrowse
                                                • 145.14.144.2
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                DOCUMENTS.exeGet hashmaliciousBrowse
                                                • 145.14.144.209
                                                DOCUMENTS.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                gv9rD9vqPS.exeGet hashmaliciousBrowse
                                                • 153.92.0.100
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.145.177
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.149
                                                documents and Details.exeGet hashmaliciousBrowse
                                                • 145.14.144.209

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exeAll details.exeGet hashmaliciousBrowse

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\All details.exe.log
                                                  Process:C:\Users\user\Desktop\All details.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):1314
                                                  Entropy (8bit):5.350128552078965
                                                  Encrypted:false
                                                  SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                  MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                  SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                  SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                  SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                  C:\Users\user\AppData\Local\Temp\tmp90EF.tmp
                                                  Process:C:\Users\user\Desktop\All details.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1647
                                                  Entropy (8bit):5.196011710761672
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBBBtn:cbh47TlNQ//rydbz9I3YODOLNdq3r
                                                  MD5:21320FC6C1B540E06A4F844A1B10D6BE
                                                  SHA1:A663192480B9D4C87A3C0D15CA4457A1BDA8D177
                                                  SHA-256:0643CF3DAB3A4331B6A29A673AFD1B8C82CE67CD7A53981936F0976F39C306DC
                                                  SHA-512:6C6E4717E7F12BD879F2C05DE1B6DB77E345516D05E15E39288DAF342E892BCF6A82AC9E573D918537FE6B1A102A065343189E6FD749D9D1D4AFFD9DB50C653A
                                                  Malicious:true
                                                  Reputation:low
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                  C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exe
                                                  Process:C:\Users\user\Desktop\All details.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):964096
                                                  Entropy (8bit):7.869265380850836
                                                  Encrypted:false
                                                  SSDEEP:12288:M0t5qL6Evo89A05qL31oaLQC+VS0tUv9HcM5UC6Doyyhvr0rSw9/P5qL1:M0TI6jw9IaaL1+VFuSM5UVyhvrdwfI1
                                                  MD5:C52453368B884441AF3614334842A4B5
                                                  SHA1:A6794ED06765806F4130265001E41E7EE395C342
                                                  SHA-256:360BDB5ECE5A96F0F7F6100DD04B1213CA18C3DA3521CDA91B30C467066E4A49
                                                  SHA-512:054251F38400EE53A20F1310C932998CDEF3B3446B5D48C98A4AE551219EC3532F6692E90ABF305CDA78A811C5C36C4DA936F3E535FD4FFDC0D8A46ABD22DF09
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 47%
                                                  Joe Sandbox View:
                                                  • Filename: All details.exe, Detection: malicious, Browse
                                                  Reputation:low
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.`..............P..|...8......R.... ........@.. ....................................@.....................................O........4.......................................................................... ............... ..H............text...X{... ...|.................. ..`.rsrc....4.......6...~..............@..@.reloc..............................@..B................4.......H.......xr.. ...............0............................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....o....('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*.0..<........~.....(3.....,!r...p.....(4...o5...s6............~.....+..*.0......
                                                  C:\Users\user\AppData\Roaming\nbSEjaNCrLELYl.exe:Zone.Identifier
                                                  Process:C:\Users\user\Desktop\All details.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview: [ZoneTransfer]....ZoneId=0

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.869265380850836
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:All details.exe
                                                  File size:964096
                                                  MD5:c52453368b884441af3614334842a4b5
                                                  SHA1:a6794ed06765806f4130265001e41e7ee395c342
                                                  SHA256:360bdb5ece5a96f0f7f6100dd04b1213ca18c3da3521cda91b30c467066e4a49
                                                  SHA512:054251f38400ee53a20f1310c932998cdef3b3446b5d48c98a4ae551219ec3532f6692e90abf305cda78a811c5c36c4da936f3e535fd4ffdc0d8a46abd22df09
                                                  SSDEEP:12288:M0t5qL6Evo89A05qL31oaLQC+VS0tUv9HcM5UC6Doyyhvr0rSw9/P5qL1:M0TI6jw9IaaL1+VFuSM5UVyhvrdwfI1
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.`..............P..|...8......R.... ........@.. ....................................@................................

                                                  File Icon

                                                  Icon Hash:f2d2e9fcc4ead362

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x4e9b52
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x609B27F2 [Wed May 12 00:57:22 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe9b000x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x34d4.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xe99c80x1c.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xe7b580xe7c00False0.909347188511data7.89003850414IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xea0000x34d40x3600False0.361617476852data5.25495063281IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xee0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_ICON0xea1000x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                  RT_GROUP_ICON0xec6b80x14data
                                                  RT_VERSION0xec6dc0x37cdata
                                                  RT_MANIFEST0xeca680xa65XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 2013
                                                  Assembly Version3.0.0.0
                                                  InternalNameScopelessEnumAttribute.exe
                                                  FileVersion3.0.0.0
                                                  CompanyName
                                                  LegalTrademarks
                                                  Comments
                                                  ProductNameServerManager_Core
                                                  ProductVersion3.0.0.0
                                                  FileDescriptionServerManager_Core
                                                  OriginalFilenameScopelessEnumAttribute.exe

                                                  Network Behavior

                                                  Snort IDS Alerts

                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  05/12/21-17:48:18.362386TCP2029927ET TROJAN AgentTesla Exfil via FTP4974021192.168.2.3145.14.144.54
                                                  05/12/21-17:48:18.520036TCP2029928ET TROJAN AgentTesla HTML System Info Report Exfil via FTP4974154705192.168.2.3145.14.144.54

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  May 12, 2021 17:48:16.697982073 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:16.851732969 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:16.851933002 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:17.026235104 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.027446985 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:17.179882050 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.333113909 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.333515882 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:17.486536980 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.585320950 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.585747004 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:17.738497019 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.738704920 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.739172935 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:17.893410921 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:17.893855095 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.049921036 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:18.050323009 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.206176996 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:18.211255074 CEST4974154705192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.260278940 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.361944914 CEST5470549741145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:18.362112045 CEST4974154705192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.362385988 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.516169071 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:18.520035982 CEST4974154705192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.520983934 CEST4974154705192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.557163000 CEST4974021192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.673944950 CEST5470549741145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:18.674694061 CEST5470549741145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:18.674810886 CEST4974154705192.168.2.3145.14.144.54
                                                  May 12, 2021 17:48:18.678936005 CEST2149740145.14.144.54192.168.2.3
                                                  May 12, 2021 17:48:18.729069948 CEST4974021192.168.2.3145.14.144.54

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  May 12, 2021 17:46:19.332011938 CEST4919953192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:19.383219957 CEST53491998.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:19.739253044 CEST5062053192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:19.807746887 CEST53506208.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:21.042601109 CEST6493853192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:21.093364000 CEST53649388.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:22.303292990 CEST6015253192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:22.351953983 CEST53601528.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:23.437283993 CEST5754453192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:23.488868952 CEST53575448.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:25.039884090 CEST5598453192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:25.091603994 CEST53559848.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:26.303716898 CEST6418553192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:26.361427069 CEST53641858.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:27.439214945 CEST6511053192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:27.488006115 CEST53651108.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:28.853420019 CEST5836153192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:28.904932976 CEST53583618.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:29.989617109 CEST6349253192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:30.038352966 CEST53634928.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:31.117041111 CEST6083153192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:31.177418947 CEST53608318.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:32.368628025 CEST6010053192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:32.428325891 CEST53601008.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:34.010633945 CEST5319553192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:34.062805891 CEST53531958.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:35.105647087 CEST5014153192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:35.154236078 CEST53501418.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:36.251277924 CEST5302353192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:36.301004887 CEST53530238.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:39.050915003 CEST4956353192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:39.100184917 CEST53495638.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:40.774332047 CEST5135253192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:40.823071003 CEST53513528.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:42.042325974 CEST5934953192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:42.091242075 CEST53593498.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:45.256654024 CEST5708453192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:45.305533886 CEST53570848.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:52.840931892 CEST5882353192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:52.902847052 CEST53588238.8.8.8192.168.2.3
                                                  May 12, 2021 17:46:54.741364956 CEST5756853192.168.2.38.8.8.8
                                                  May 12, 2021 17:46:54.800057888 CEST53575688.8.8.8192.168.2.3
                                                  May 12, 2021 17:47:05.946849108 CEST5054053192.168.2.38.8.8.8
                                                  May 12, 2021 17:47:06.005633116 CEST53505408.8.8.8192.168.2.3
                                                  May 12, 2021 17:47:14.049849987 CEST5436653192.168.2.38.8.8.8
                                                  May 12, 2021 17:47:14.110307932 CEST53543668.8.8.8192.168.2.3
                                                  May 12, 2021 17:47:26.005821943 CEST5303453192.168.2.38.8.8.8
                                                  May 12, 2021 17:47:26.073554993 CEST53530348.8.8.8192.168.2.3
                                                  May 12, 2021 17:47:32.191529036 CEST5776253192.168.2.38.8.8.8
                                                  May 12, 2021 17:47:32.253304958 CEST53577628.8.8.8192.168.2.3
                                                  May 12, 2021 17:48:04.290101051 CEST5543553192.168.2.38.8.8.8
                                                  May 12, 2021 17:48:04.362938881 CEST53554358.8.8.8192.168.2.3
                                                  May 12, 2021 17:48:06.346635103 CEST5071353192.168.2.38.8.8.8
                                                  May 12, 2021 17:48:06.403866053 CEST53507138.8.8.8192.168.2.3
                                                  May 12, 2021 17:48:16.391083956 CEST5613253192.168.2.38.8.8.8
                                                  May 12, 2021 17:48:16.466445923 CEST53561328.8.8.8192.168.2.3
                                                  May 12, 2021 17:48:16.490331888 CEST5898753192.168.2.38.8.8.8
                                                  May 12, 2021 17:48:16.563173056 CEST53589878.8.8.8192.168.2.3

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  May 12, 2021 17:48:16.391083956 CEST192.168.2.38.8.8.80x9930Standard query (0)files.000webhost.comA (IP address)IN (0x0001)
                                                  May 12, 2021 17:48:16.490331888 CEST192.168.2.38.8.8.80x16faStandard query (0)files.000webhost.comA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  May 12, 2021 17:48:16.466445923 CEST8.8.8.8192.168.2.30x9930No error (0)files.000webhost.comus-east-1.route-1000.000webhost.awex.ioCNAME (Canonical name)IN (0x0001)
                                                  May 12, 2021 17:48:16.466445923 CEST8.8.8.8192.168.2.30x9930No error (0)us-east-1.route-1000.000webhost.awex.io145.14.144.54A (IP address)IN (0x0001)
                                                  May 12, 2021 17:48:16.563173056 CEST8.8.8.8192.168.2.30x16faNo error (0)files.000webhost.comus-east-1.route-1000.000webhost.awex.ioCNAME (Canonical name)IN (0x0001)
                                                  May 12, 2021 17:48:16.563173056 CEST8.8.8.8192.168.2.30x16faNo error (0)us-east-1.route-1000.000webhost.awex.io145.14.144.209A (IP address)IN (0x0001)

                                                  FTP Packets

                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  May 12, 2021 17:48:17.026235104 CEST2149740145.14.144.54192.168.2.3220 ProFTPD Server (000webhost.com) [::ffff:145.14.144.54]
                                                  May 12, 2021 17:48:17.027446985 CEST4974021192.168.2.3145.14.144.54USER zinco
                                                  May 12, 2021 17:48:17.333113909 CEST2149740145.14.144.54192.168.2.3331 User zinco OK. Password required
                                                  May 12, 2021 17:48:17.333515882 CEST4974021192.168.2.3145.14.144.54PASS computer147
                                                  May 12, 2021 17:48:17.585320950 CEST2149740145.14.144.54192.168.2.3230-Your bandwidth usage is restricted
                                                  230-Your bandwidth usage is restricted230 OK. Current restricted directory is /
                                                  May 12, 2021 17:48:17.738704920 CEST2149740145.14.144.54192.168.2.3200 OK, UTF-8 enabled
                                                  May 12, 2021 17:48:17.739172935 CEST4974021192.168.2.3145.14.144.54PWD
                                                  May 12, 2021 17:48:17.893410921 CEST2149740145.14.144.54192.168.2.3257 "/" is your current location
                                                  May 12, 2021 17:48:17.893855095 CEST4974021192.168.2.3145.14.144.54TYPE I
                                                  May 12, 2021 17:48:18.049921036 CEST2149740145.14.144.54192.168.2.3200 TYPE is now 8-bit binary
                                                  May 12, 2021 17:48:18.050323009 CEST4974021192.168.2.3145.14.144.54PASV
                                                  May 12, 2021 17:48:18.206176996 CEST2149740145.14.144.54192.168.2.3227 Entering Passive Mode (145,14,144,54,213,177).
                                                  May 12, 2021 17:48:18.362385988 CEST4974021192.168.2.3145.14.144.54STOR PW_user-124406_2021_05_12_20_45_31.html
                                                  May 12, 2021 17:48:18.516169071 CEST2149740145.14.144.54192.168.2.3150 Connecting to port 45492
                                                  May 12, 2021 17:48:18.678936005 CEST2149740145.14.144.54192.168.2.3226-File successfully transferred
                                                  226-File successfully transferred226 0.161 seconds (measured here), 2.65 Kbytes per second

                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:17:46:25
                                                  Start date:12/05/2021
                                                  Path:C:\Users\user\Desktop\All details.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\All details.exe'
                                                  Imagebase:0x200000
                                                  File size:964096 bytes
                                                  MD5 hash:C52453368B884441AF3614334842A4B5
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.227685594.0000000003621000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.227200058.000000000266D000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  General

                                                  Start time:17:46:32
                                                  Start date:12/05/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\nbSEjaNCrLELYl' /XML 'C:\Users\user\AppData\Local\Temp\tmp90EF.tmp'
                                                  Imagebase:0xc70000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:17:46:32
                                                  Start date:12/05/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6b2800000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:17:46:33
                                                  Start date:12/05/2021
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Imagebase:0xf90000
                                                  File size:45152 bytes
                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.484700152.000000000345F000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.483305104.0000000003231000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.479473527.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  Reputation:high

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >