Loading ...

Play interactive tourEdit tour

Analysis Report SWIFT COPY.pdf.exe

Overview

General Information

Sample Name:SWIFT COPY.pdf.exe
Analysis ID:412589
MD5:d01daeb6c9af5256a25dffe76a448f04
SHA1:50aab2959bbc6d9e31eb477e6602ffbcb64343ce
SHA256:490ae1eb1637910af1a69c6317ef81a47518b809f5b6da4b8f66d72582e25b9b
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • SWIFT COPY.pdf.exe (PID: 4800 cmdline: 'C:\Users\user\Desktop\SWIFT COPY.pdf.exe' MD5: D01DAEB6C9AF5256A25DFFE76A448F04)
    • schtasks.exe (PID: 6112 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\bSlxGzdE' /XML 'C:\Users\user\AppData\Local\Temp\tmp15D1.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • SWIFT COPY.pdf.exe (PID: 1372 cmdline: C:\Users\user\Desktop\SWIFT COPY.pdf.exe MD5: D01DAEB6C9AF5256A25DFFE76A448F04)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "imam@esquiresweaters.comEsquire@#2078mail.esquiresweaters.comkingmangreatgoldenqlory@yandex.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.SWIFT COPY.pdf.exe.39dcc38.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.SWIFT COPY.pdf.exe.39dcc38.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.SWIFT COPY.pdf.exe.39dcc38.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.SWIFT COPY.pdf.exe.39dcc38.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    3.2.SWIFT COPY.pdf.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Double ExtensionShow sources
                      Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: C:\Users\user\Desktop\SWIFT COPY.pdf.exe, CommandLine: C:\Users\user\Desktop\SWIFT COPY.pdf.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\SWIFT COPY.pdf.exe, NewProcessName: C:\Users\user\Desktop\SWIFT COPY.pdf.exe, OriginalFileName: C:\Users\user\Desktop\SWIFT COPY.pdf.exe, ParentCommandLine: 'C:\Users\user\Desktop\SWIFT COPY.pdf.exe' , ParentImage: C:\Users\user\Desktop\SWIFT COPY.pdf.exe, ParentProcessId: 4800, ProcessCommandLine: C:\Users\user\Desktop\SWIFT COPY.pdf.exe, ProcessId: 1372

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "imam@esquiresweaters.comEsquire@#2078mail.esquiresweaters.comkingmangreatgoldenqlory@yandex.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\bSlxGzdE.exeReversingLabs: Detection: 27%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: SWIFT COPY.pdf.exeVirustotal: Detection: 27%Perma Link
                      Source: SWIFT COPY.pdf.exeReversingLabs: Detection: 27%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\bSlxGzdE.exeJoe Sandbox ML: detected
                      Machine Learning detection for sampleShow sources
                      Source: SWIFT COPY.pdf.exeJoe Sandbox ML: detected
                      Source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 3.2.SWIFT COPY.pdf.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: SWIFT COPY.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: SWIFT COPY.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: mscorrc.pdb source: SWIFT COPY.pdf.exe, 00000000.00000002.651791901.0000000004A10000.00000002.00000001.sdmp
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
                      Source: Joe Sandbox ViewIP Address: 192.185.171.219 192.185.171.219
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_009EA09A recv,
                      Source: unknownDNS traffic detected: queries for: mail.esquiresweaters.com
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: http://hcVzVgyZjXO8egOI.net
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: http://hsfZEB.com
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: SWIFT COPY.pdf.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.650618074.00000000008F0000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b9A568286u002dB76Au002d4BC4u002d95DAu002dFD4302A7CF0Bu007d/B73E2BD9u002d65FCu002d4CE0u002dA6E2u002dC104494B7D90.csLarge array initialization: .cctor: array initializer size 12000
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: SWIFT COPY.pdf.exe
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_0239113E NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_0239110D NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_009EB0BA NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_009EB089 NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_00128014
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_00122050
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EE480
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E2080
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EE0B8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E3D38
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EDD68
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EEAB0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E0AC8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E12F0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EEE18
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E4BB8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E17B0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E1BE8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E2BF8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E33F8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6F50
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EA8E0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E701C
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E3868
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E207A
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E3878
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6988
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E0D9F
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E7998
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E7997
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EC9A0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E21D5
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E15D0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EBDE8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E15E0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E3D28
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EA940
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E5960
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6961
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E5970
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EAEA0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E0AB8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E4AC8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EAEE0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6650
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6660
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E5798
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E17A0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E5BD8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E63D8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E33E8
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E4B0C
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E2B4D
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6F40
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6B68
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E6B63
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008EBB70
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_059218AD
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_0592029D
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_059219E6
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_05920202
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_05920006
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_0592024E
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_05920070
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_00E58440
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_00E57928
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_00E58A68
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_054F9D58
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_054F59E0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_054F1BB0
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_054FF460
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_054FC880
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_054FF4A8
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.650305500.00000000001CA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSerializationMask.exeP vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamecqJulhxlUbeYTFCQVbjWm.exe4 vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651583507.0000000003A96000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.652984206.0000000005640000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651791901.0000000004A10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.653230553.0000000005740000.00000002.00000001.sdmpBinary or memory string: originalfilename vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.653230553.0000000005740000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651146949.00000000028C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.650618074.00000000008F0000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exeBinary or memory string: OriginalFilename vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamecqJulhxlUbeYTFCQVbjWm.exe4 vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000003.00000000.649325771.00000000004AA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSerializationMask.exeP vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.909009189.0000000004E80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.906804015.0000000000BEA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exeBinary or memory string: OriginalFilenameSerializationMask.exeP vs SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: SWIFT COPY.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: bSlxGzdE.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@1/1
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_02390FC2 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_02390F8B AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_009EAF3E AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_009EAF07 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile created: C:\Users\user\AppData\Roaming\bSlxGzdE.exeJump to behavior
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4296:120:WilError_01
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp15D1.tmpJump to behavior
                      Source: SWIFT COPY.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: SWIFT COPY.pdf.exeVirustotal: Detection: 27%
                      Source: SWIFT COPY.pdf.exeReversingLabs: Detection: 27%
                      Source: SWIFT COPY.pdf.exeString found in binary or memory: ^(Male|Female)$-Add Student Details :-
                      Source: SWIFT COPY.pdf.exeString found in binary or memory: Teacher Name-Add Teacher Details :-
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile read: C:\Users\user\Desktop\SWIFT COPY.pdf.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\SWIFT COPY.pdf.exe 'C:\Users\user\Desktop\SWIFT COPY.pdf.exe'
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\bSlxGzdE' /XML 'C:\Users\user\AppData\Local\Temp\tmp15D1.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess created: C:\Users\user\Desktop\SWIFT COPY.pdf.exe C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\bSlxGzdE' /XML 'C:\Users\user\AppData\Local\Temp\tmp15D1.tmp'
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess created: C:\Users\user\Desktop\SWIFT COPY.pdf.exe C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: SWIFT COPY.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: SWIFT COPY.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: mscorrc.pdb source: SWIFT COPY.pdf.exe, 00000000.00000002.651791901.0000000004A10000.00000002.00000001.sdmp
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E982C push edx; ret
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E0C6F push dword ptr [ebp+eax-18h]; ret
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 0_2_008E320A pushfd ; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.61635916813
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.61635916813
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile created: C:\Users\user\AppData\Roaming\bSlxGzdE.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\bSlxGzdE' /XML 'C:\Users\user\AppData\Local\Temp\tmp15D1.tmp'

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Uses an obfuscated file name to hide its real file extension (double extension)Show sources
                      Source: Possible double extension: pdf.exeStatic PE information: SWIFT COPY.pdf.exe
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SWIFT COPY.pdf.exe PID: 4800, type: MEMORY
                      Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFunction Chain: systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,memAlloc,systemQueried,threadDelayed,threadDelayed,threadDelayed,processSet,processSet,memAlloc,memAlloc,memAlloc,memAlloc
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWindow / User API: threadDelayed 673
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exe TID: 4732Thread sleep time: -100275s >= -30000s
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exe TID: 5108Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exe TID: 5648Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exe TID: 5648Thread sleep count: 673 > 30
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exe TID: 5648Thread sleep time: -20190000s >= -30000s
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exe TID: 5648Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeThread delayed: delay time: 100275
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeThread delayed: delay time: 30000
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeThread delayed: delay time: 30000
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.909009189.0000000004E80000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.906871779.0000000000C5B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.909009189.0000000004E80000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.909009189.0000000004E80000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: SWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.909009189.0000000004E80000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeCode function: 3_2_00E53A68 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeMemory written: C:\Users\user\Desktop\SWIFT COPY.pdf.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\bSlxGzdE' /XML 'C:\Users\user\AppData\Local\Temp\tmp15D1.tmp'
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeProcess created: C:\Users\user\Desktop\SWIFT COPY.pdf.exe C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907009056.0000000001200000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907009056.0000000001200000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907009056.0000000001200000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: SWIFT COPY.pdf.exe, 00000003.00000002.907009056.0000000001200000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.651416381.00000000038C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.651416381.00000000038C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SWIFT COPY.pdf.exe PID: 4800, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SWIFT COPY.pdf.exe PID: 1372, type: MEMORY
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\SWIFT COPY.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SWIFT COPY.pdf.exe PID: 1372, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.651416381.00000000038C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.651416381.00000000038C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SWIFT COPY.pdf.exe PID: 4800, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SWIFT COPY.pdf.exe PID: 1372, type: MEMORY
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SWIFT COPY.pdf.exe.39dcc38.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.1.SWIFT COPY.pdf.exe.400000.0.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Access Token Manipulation1Disable or Modify Tools11OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1Input Capture111System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsCommand and Scripting Interpreter2Logon Script (Windows)Scheduled Task/Job1Obfuscated Files or Information13Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsScheduled Task/Job1Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery321Distributed Component Object ModelInput Capture111Scheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading11LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsVirtualization/Sandbox Evasion141VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      SWIFT COPY.pdf.exe27%VirustotalBrowse
                      SWIFT COPY.pdf.exe28%ReversingLabsWin32.Trojan.Wacatac
                      SWIFT COPY.pdf.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\bSlxGzdE.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\bSlxGzdE.exe28%ReversingLabsWin32.Trojan.Wacatac

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      3.1.SWIFT COPY.pdf.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      3.2.SWIFT COPY.pdf.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://hcVzVgyZjXO8egOI.net0%Avira URL Cloudsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://hsfZEB.com0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.esquiresweaters.com
                      192.185.171.219
                      truetrue
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://api.ipify.org%GETMozilla/5.0SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://DynDns.comDynDNSSWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haSWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://hcVzVgyZjXO8egOI.netSWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.org%SWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSWIFT COPY.pdf.exefalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssSWIFT COPY.pdf.exe, 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmpfalse
                          high
                          http://hsfZEB.comSWIFT COPY.pdf.exe, 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          192.185.171.219
                          mail.esquiresweaters.comUnited States
                          46606UNIFIEDLAYER-AS-1UStrue

                          General Information

                          Joe Sandbox Version:32.0.0 Black Diamond
                          Analysis ID:412589
                          Start date:12.05.2021
                          Start time:19:53:31
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 8m 42s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:SWIFT COPY.pdf.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:4
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@6/4@1/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 1.2% (good quality ratio 0.4%)
                          • Quality average: 24.6%
                          • Quality standard deviation: 33.2%
                          HCA Information:
                          • Successful, ratio: 95%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Excluded IPs from analysis (whitelisted): 13.88.21.125, 40.88.32.150, 104.43.193.48, 168.61.161.212, 8.241.89.254, 8.241.82.254, 8.241.88.254, 8.241.83.126, 8.238.27.126
                          • Excluded domains from analysis (whitelisted): skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net, skypedataprdcolcus15.cloudapp.net
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          19:54:17API Interceptor970x Sleep call for process: SWIFT COPY.pdf.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          192.185.171.219Revised Invoice pdf.exeGet hashmaliciousBrowse
                            dd9097e7_by_Libranalysis.exeGet hashmaliciousBrowse
                              PO#6275473 pdf.exeGet hashmaliciousBrowse
                                SHIPPING DOCUMENTS doc.exeGet hashmaliciousBrowse
                                  Due Invoice PDF.exeGet hashmaliciousBrowse
                                    DHL_AWB# 9284730932 doc.exeGet hashmaliciousBrowse
                                      new order xlsx.exeGet hashmaliciousBrowse
                                        invoice copypdf.exeGet hashmaliciousBrowse
                                          PO pdf.exeGet hashmaliciousBrowse
                                            Pl l2021-003.pdf.exeGet hashmaliciousBrowse

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              mail.esquiresweaters.comRevised Invoice pdf.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              dd9097e7_by_Libranalysis.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              PO#6275473 pdf.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              SHIPPING DOCUMENTS doc.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              Due Invoice PDF.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              DHL_AWB# 9284730932 doc.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              new order xlsx.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              invoice copypdf.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              PO pdf.exeGet hashmaliciousBrowse
                                              • 192.185.171.219
                                              Pl l2021-003.pdf.exeGet hashmaliciousBrowse
                                              • 192.185.171.219

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              UNIFIEDLAYER-AS-1USd6U17S2KY1.exeGet hashmaliciousBrowse
                                              • 67.20.76.71
                                              statistic-482095214.xlsGet hashmaliciousBrowse
                                              • 192.254.186.229
                                              statistic-482095214.xlsGet hashmaliciousBrowse
                                              • 192.254.186.229
                                              090811fa_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              090811fa_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              54402971_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              54402971_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              afdab907_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              afdab907_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              70654 SSEBACIC EGYPT.exeGet hashmaliciousBrowse
                                              • 192.254.185.244
                                              8100c344_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              8100c344_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              32154f4c_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              32154f4c_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              9659e9a8_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              46747509_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              46747509_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 192.185.32.232
                                              457b22da_by_Libranalysis.exeGet hashmaliciousBrowse
                                              • 192.232.222.43
                                              abc8a77f_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                              • 67.20.76.71
                                              Revised Invoice pdf.exeGet hashmaliciousBrowse
                                              • 192.185.171.219

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\SWIFT COPY.pdf.exe.log
                                              Process:C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):664
                                              Entropy (8bit):5.288448637977022
                                              Encrypted:false
                                              SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                                              MD5:B1DB55991C3DA14E35249AEA1BC357CA
                                              SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                                              SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                                              SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                                              Malicious:true
                                              Reputation:moderate, very likely benign file
                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                                              C:\Users\user\AppData\Local\Temp\tmp15D1.tmp
                                              Process:C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1641
                                              Entropy (8bit):5.179103515573141
                                              Encrypted:false
                                              SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGOYtn:cbhK79lNQR/rydbz9I3YODOLNdq3i
                                              MD5:264C0BFB619AAA12925A0DE1A1755932
                                              SHA1:21073F33E2360AE8458543F0E1FAD6182C38764D
                                              SHA-256:5C81D0E909BC23C0C3C7E8D4A3E9ACD20E45B2AEE2B0A6450BA311CFFBCA0CF6
                                              SHA-512:268FDA59FB5FE94548DFCD9B65814A08F31F77822FB0EC67D469737FE2C295A9C690637978CEEA8C20A82AB42B0700609F5A8231A2F1D9FDE598B9207509CA14
                                              Malicious:true
                                              Reputation:low
                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                              C:\Users\user\AppData\Roaming\bSlxGzdE.exe
                                              Process:C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):686592
                                              Entropy (8bit):7.6047456297753016
                                              Encrypted:false
                                              SSDEEP:12288:Gx3ZC2zGSQW+Lfs4AGcsx3gOYgIDslrNUspGrBA3qTYo9TiZRzI:Gx3ZNGSdmk1sx9xGQTqTYoF0zI
                                              MD5:D01DAEB6C9AF5256A25DFFE76A448F04
                                              SHA1:50AAB2959BBC6D9E31EB477E6602FFBCB64343CE
                                              SHA-256:490AE1EB1637910AF1A69C6317EF81A47518B809F5B6DA4B8F66D72582E25B9B
                                              SHA-512:F7EC0D4E48D6CDBCAA0EA67E67589488AA939C8052ADBC8D4545D7040F2B251D58625530CB294436DF0C81821D77387A3DA56DACF2B0B9AB06AB29DA96AAF00F
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 28%
                                              Reputation:low
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`..............P..f..........z.... ........@.. ....................................@.................................(...O.......H............................................................................ ............... ..H............text....d... ...f.................. ..`.rsrc...H............h..............@..@.reloc...............x..............@..B................\.......H...........h...........X...............................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....oS...('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*.0..<........~.....(3.....,!r...p.....(4...o5...s6............~.....+..*.0......
                                              C:\Users\user\AppData\Roaming\bSlxGzdE.exe:Zone.Identifier
                                              Process:C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview: [ZoneTransfer]....ZoneId=0

                                              Static File Info

                                              General

                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.6047456297753016
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:SWIFT COPY.pdf.exe
                                              File size:686592
                                              MD5:d01daeb6c9af5256a25dffe76a448f04
                                              SHA1:50aab2959bbc6d9e31eb477e6602ffbcb64343ce
                                              SHA256:490ae1eb1637910af1a69c6317ef81a47518b809f5b6da4b8f66d72582e25b9b
                                              SHA512:f7ec0d4e48d6cdbcaa0ea67e67589488aa939c8052adbc8d4545d7040f2b251d58625530cb294436df0c81821d77387a3da56dacf2b0b9ab06ab29da96aaf00f
                                              SSDEEP:12288:Gx3ZC2zGSQW+Lfs4AGcsx3gOYgIDslrNUspGrBA3qTYo9TiZRzI:Gx3ZNGSdmk1sx9xGQTqTYoF0zI
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..f..........z.... ........@.. ....................................@................................

                                              File Icon

                                              Icon Hash:00828e8e8686b000

                                              Static PE Info

                                              General

                                              Entrypoint:0x4a847a
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x609BD3E9 [Wed May 12 13:11:05 2021 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v2.0.50727
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                              Entrypoint Preview

                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa84280x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000xe48.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xa64800xa6600False0.794522739012data7.61635916813IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rsrc0xaa0000xe480x1000False0.337158203125data4.66359786647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xac0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0xaa0900x374data
                                              RT_MANIFEST0xaa4140xa2eXML 1.0 document, UTF-8 Unicode (with BOM) text

                                              Imports

                                              DLLImport
                                              mscoree.dll_CorExeMain

                                              Version Infos

                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyrightCopyright 2020
                                              Assembly Version1.0.0.0
                                              InternalNameSerializationMask.exe
                                              FileVersion1.0.0.0
                                              CompanyName
                                              LegalTrademarks
                                              Comments
                                              ProductNameLibraryManagementSystem
                                              ProductVersion1.0.0.0
                                              FileDescriptionLibraryManagementSystem
                                              OriginalFilenameSerializationMask.exe

                                              Network Behavior

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              May 12, 2021 19:55:49.827377081 CEST49731587192.168.2.4192.185.171.219
                                              May 12, 2021 19:55:49.990392923 CEST58749731192.185.171.219192.168.2.4
                                              May 12, 2021 19:55:49.990609884 CEST49731587192.168.2.4192.185.171.219
                                              May 12, 2021 19:55:50.075501919 CEST49731587192.168.2.4192.185.171.219
                                              May 12, 2021 19:55:50.238719940 CEST58749731192.185.171.219192.168.2.4
                                              May 12, 2021 19:55:50.468322039 CEST58749731192.185.171.219192.168.2.4
                                              May 12, 2021 19:55:50.468349934 CEST58749731192.185.171.219192.168.2.4
                                              May 12, 2021 19:55:50.468589067 CEST49731587192.168.2.4192.185.171.219
                                              May 12, 2021 19:55:50.468724966 CEST49731587192.168.2.4192.185.171.219
                                              May 12, 2021 19:55:50.468759060 CEST58749731192.185.171.219192.168.2.4
                                              May 12, 2021 19:55:50.468842030 CEST49731587192.168.2.4192.185.171.219

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              May 12, 2021 19:54:10.219254017 CEST5992053192.168.2.48.8.8.8
                                              May 12, 2021 19:54:10.268090963 CEST53599208.8.8.8192.168.2.4
                                              May 12, 2021 19:54:11.296245098 CEST5745853192.168.2.48.8.8.8
                                              May 12, 2021 19:54:11.345093012 CEST53574588.8.8.8192.168.2.4
                                              May 12, 2021 19:54:12.049468040 CEST5057953192.168.2.48.8.8.8
                                              May 12, 2021 19:54:12.098505020 CEST53505798.8.8.8192.168.2.4
                                              May 12, 2021 19:54:13.534708023 CEST5170353192.168.2.48.8.8.8
                                              May 12, 2021 19:54:13.583475113 CEST53517038.8.8.8192.168.2.4
                                              May 12, 2021 19:54:14.511550903 CEST6524853192.168.2.48.8.8.8
                                              May 12, 2021 19:54:14.563117027 CEST53652488.8.8.8192.168.2.4
                                              May 12, 2021 19:54:15.801309109 CEST5372353192.168.2.48.8.8.8
                                              May 12, 2021 19:54:15.862579107 CEST53537238.8.8.8192.168.2.4
                                              May 12, 2021 19:54:16.630567074 CEST6464653192.168.2.48.8.8.8
                                              May 12, 2021 19:54:16.690567970 CEST53646468.8.8.8192.168.2.4
                                              May 12, 2021 19:54:18.120687962 CEST6529853192.168.2.48.8.8.8
                                              May 12, 2021 19:54:18.169804096 CEST53652988.8.8.8192.168.2.4
                                              May 12, 2021 19:54:18.945823908 CEST5912353192.168.2.48.8.8.8
                                              May 12, 2021 19:54:18.999274969 CEST53591238.8.8.8192.168.2.4
                                              May 12, 2021 19:54:20.148967028 CEST5453153192.168.2.48.8.8.8
                                              May 12, 2021 19:54:20.197736979 CEST53545318.8.8.8192.168.2.4
                                              May 12, 2021 19:54:20.997957945 CEST4971453192.168.2.48.8.8.8
                                              May 12, 2021 19:54:21.046751022 CEST53497148.8.8.8192.168.2.4
                                              May 12, 2021 19:54:21.781753063 CEST5802853192.168.2.48.8.8.8
                                              May 12, 2021 19:54:21.834167004 CEST53580288.8.8.8192.168.2.4
                                              May 12, 2021 19:54:22.727451086 CEST5309753192.168.2.48.8.8.8
                                              May 12, 2021 19:54:22.776396990 CEST53530978.8.8.8192.168.2.4
                                              May 12, 2021 19:54:24.464984894 CEST4925753192.168.2.48.8.8.8
                                              May 12, 2021 19:54:24.516637087 CEST53492578.8.8.8192.168.2.4
                                              May 12, 2021 19:54:25.377623081 CEST6238953192.168.2.48.8.8.8
                                              May 12, 2021 19:54:25.429116964 CEST53623898.8.8.8192.168.2.4
                                              May 12, 2021 19:54:26.265916109 CEST4991053192.168.2.48.8.8.8
                                              May 12, 2021 19:54:26.317487001 CEST53499108.8.8.8192.168.2.4
                                              May 12, 2021 19:54:27.091270924 CEST5585453192.168.2.48.8.8.8
                                              May 12, 2021 19:54:27.142944098 CEST53558548.8.8.8192.168.2.4
                                              May 12, 2021 19:55:05.237675905 CEST6454953192.168.2.48.8.8.8
                                              May 12, 2021 19:55:05.292355061 CEST53645498.8.8.8192.168.2.4
                                              May 12, 2021 19:55:49.612812996 CEST6315353192.168.2.48.8.8.8
                                              May 12, 2021 19:55:49.796298981 CEST53631538.8.8.8192.168.2.4

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              May 12, 2021 19:55:49.612812996 CEST192.168.2.48.8.8.80xafbaStandard query (0)mail.esquiresweaters.comA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              May 12, 2021 19:55:49.796298981 CEST8.8.8.8192.168.2.40xafbaNo error (0)mail.esquiresweaters.com192.185.171.219A (IP address)IN (0x0001)

                                              SMTP Packets

                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              May 12, 2021 19:55:50.468322039 CEST58749731192.185.171.219192.168.2.4220-mx6.websitewelcome.com ESMTP Exim 4.94.2 #2 Wed, 12 May 2021 12:55:50 -0500
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              May 12, 2021 19:55:50.468349934 CEST58749731192.185.171.219192.168.2.4421 mx6.websitewelcome.com lost input connection

                                              Code Manipulations

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:19:54:16
                                              Start date:12/05/2021
                                              Path:C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\Desktop\SWIFT COPY.pdf.exe'
                                              Imagebase:0x120000
                                              File size:686592 bytes
                                              MD5 hash:D01DAEB6C9AF5256A25DFFE76A448F04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.651169792.00000000028EB000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.651416381.00000000038C1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.651416381.00000000038C1000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:19:54:19
                                              Start date:12/05/2021
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\bSlxGzdE' /XML 'C:\Users\user\AppData\Local\Temp\tmp15D1.tmp'
                                              Imagebase:0x9c0000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:19:54:19
                                              Start date:12/05/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff724c50000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:19:54:20
                                              Start date:12/05/2021
                                              Path:C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\SWIFT COPY.pdf.exe
                                              Imagebase:0x400000
                                              File size:686592 bytes
                                              MD5 hash:D01DAEB6C9AF5256A25DFFE76A448F04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000002.906433555.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000001.650056803.0000000000402000.00000040.00020000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.907665647.0000000002BC1000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              Disassembly

                                              Code Analysis

                                              Reset < >