Loading ...

Play interactive tourEdit tour

Analysis Report Factura PO 1541973.exe

Overview

General Information

Sample Name:Factura PO 1541973.exe
Analysis ID:433037
MD5:429a3063db13e84f8e0843f46b60753e
SHA1:de9221c73fe3610393f1f9197dfecf0896ed776c
SHA256:62e122a12ea4ccace679e22b13975e1f0e476dda8373279d99b757635c8b06dc
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • Factura PO 1541973.exe (PID: 6920 cmdline: 'C:\Users\user\Desktop\Factura PO 1541973.exe' MD5: 429A3063DB13E84F8E0843F46B60753E)
    • schtasks.exe (PID: 7084 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Factura PO 1541973.exe (PID: 7136 cmdline: C:\Users\user\Desktop\Factura PO 1541973.exe MD5: 429A3063DB13E84F8E0843F46B60753E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "dubai@skycomex.com@EHbqYU1us2.smtp.mailhostbox.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.0.Factura PO 1541973.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.0.Factura PO 1541973.exe.400000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Factura PO 1541973.exe.404fad0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Factura PO 1541973.exe.404fad0.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    4.2.Factura PO 1541973.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "dubai@skycomex.com@EHbqYU1us2.smtp.mailhostbox.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeMetadefender: Detection: 20%Perma Link
                      Source: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeReversingLabs: Detection: 34%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Factura PO 1541973.exeVirustotal: Detection: 34%Perma Link
                      Source: Factura PO 1541973.exeMetadefender: Detection: 20%Perma Link
                      Source: Factura PO 1541973.exeReversingLabs: Detection: 34%
                      Source: 4.2.Factura PO 1541973.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: Factura PO 1541973.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Factura PO 1541973.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdbL source: Factura PO 1541973.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdb source: Factura PO 1541973.exe

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49771 -> 208.91.199.223:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49772 -> 208.91.199.223:587
                      Source: global trafficTCP traffic: 192.168.2.4:49771 -> 208.91.199.223:587
                      Source: Joe Sandbox ViewIP Address: 208.91.199.223 208.91.199.223
                      Source: global trafficTCP traffic: 192.168.2.4:49771 -> 208.91.199.223:587
                      Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000003.858298741.0000000000BC4000.00000004.00000001.sdmpString found in binary or memory: http://kCE9JYg5iS.com
                      Source: Factura PO 1541973.exe, 00000000.00000002.655902349.0000000002DA1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Factura PO 1541973.exe, 00000004.00000002.912784647.0000000002DF5000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: http://wJzLSk.com
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Factura PO 1541973.exe, 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007bE03313AEu002d3B32u002d4C21u002d8888u002d76A497628B03u007d/u00356DE45A1u002d0E78u002d48B9u002dA86Au002d089C7C45AC59.csLarge array initialization: .cctor: array initializer size 11957
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013BC3A0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013BA758
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B628
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9C048
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9822E
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9AD98
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9CFB0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D97B00
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D97550
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D97540
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9F530
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B618
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9A190
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9A1A0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9F098
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B050
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D90040
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9B060
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D90007
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9C038
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9F2D0
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_05D9AD92
                      Source: Factura PO 1541973.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: lVzZfJoExG.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Factura PO 1541973.exe, 00000000.00000002.660645491.000000000BFC0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameVBQEHAlZHGNDbNAwDJmWxqJmACCGvaNOCDccRWP.exe4 vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.660113293.0000000005F80000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.661127774.000000000C0B0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.661127774.000000000C0B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000000.00000002.655024928.0000000000A36000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorInfo.exe< vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameVBQEHAlZHGNDbNAwDJmWxqJmACCGvaNOCDccRWP.exe4 vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.911552216.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.911598571.0000000000FF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000000.654201525.00000000006E6000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorInfo.exe< vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.911323137.0000000000D9A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.910525371.0000000000AF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exeBinary or memory string: OriginalFilenameConstructorInfo.exe< vs Factura PO 1541973.exe
                      Source: Factura PO 1541973.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Factura PO 1541973.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: lVzZfJoExG.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.0.Factura PO 1541973.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@1/1
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile created: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeMutant created: \Sessions\1\BaseNamedObjects\vWppkWwsbmKGuLII
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7100:120:WilError_01
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2A03.tmpJump to behavior
                      Source: Factura PO 1541973.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: Factura PO 1541973.exeVirustotal: Detection: 34%
                      Source: Factura PO 1541973.exeMetadefender: Detection: 20%
                      Source: Factura PO 1541973.exeReversingLabs: Detection: 34%
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile read: C:\Users\user\Desktop\Factura PO 1541973.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe 'C:\Users\user\Desktop\Factura PO 1541973.exe'
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe C:\Users\user\Desktop\Factura PO 1541973.exe
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe C:\Users\user\Desktop\Factura PO 1541973.exe
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Factura PO 1541973.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Factura PO 1541973.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Factura PO 1541973.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdbL source: Factura PO 1541973.exe
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\pVNuovjPXl\src\obj\Debug\ConstructorInfo.pdb source: Factura PO 1541973.exe
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013B043B pushad ; ret
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeCode function: 0_2_013B0438 pushad ; ret
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.96018720186
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.96018720186
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile created: C:\Users\user\AppData\Roaming\lVzZfJoExG.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 6920, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWindow / User API: threadDelayed 922
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWindow / User API: threadDelayed 8896
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6924Thread sleep time: -102917s >= -30000s
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6964Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6000Thread sleep time: -13835058055282155s >= -30000s
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6012Thread sleep count: 922 > 30
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6012Thread sleep count: 8896 > 30
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exe TID: 6000Thread sleep count: 35 > 30
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 102917
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeThread delayed: delay time: 922337203685477
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Factura PO 1541973.exe, 00000004.00000003.871802773.0000000000E81000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlles\TypeLib\{F935DC20-1CF0-11D0-ADB9-00C04FD58A0B}
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Factura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeMemory written: C:\Users\user\Desktop\Factura PO 1541973.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeProcess created: C:\Users\user\Desktop\Factura PO 1541973.exe C:\Users\user\Desktop\Factura PO 1541973.exe
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: Factura PO 1541973.exe, 00000004.00000002.911734288.0000000001420000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Users\user\Desktop\Factura PO 1541973.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Users\user\Desktop\Factura PO 1541973.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 7136, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 6920, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\Factura PO 1541973.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 7136, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 7136, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Factura PO 1541973.exe PID: 6920, type: MEMORY
                      Source: Yara matchFile source: 4.0.Factura PO 1541973.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.Factura PO 1541973.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Factura PO 1541973.exe.404fad0.2.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery321Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsVirtualization/Sandbox Evasion141VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Factura PO 1541973.exe34%VirustotalBrowse
                      Factura PO 1541973.exe23%MetadefenderBrowse
                      Factura PO 1541973.exe34%ReversingLabsByteCode-MSIL.Spyware.Negasteal

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe23%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe34%ReversingLabsByteCode-MSIL.Spyware.Negasteal

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.Factura PO 1541973.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      4.0.Factura PO 1541973.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://wJzLSk.com0%Avira URL Cloudsafe
                      http://kCE9JYg5iS.com0%Avira URL Cloudsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us2.smtp.mailhostbox.com
                      208.91.199.223
                      truefalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://api.ipify.org%GETMozilla/5.0Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://DynDns.comDynDNSFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://us2.smtp.mailhostbox.comFactura PO 1541973.exe, 00000004.00000002.912784647.0000000002DF5000.00000004.00000001.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFactura PO 1541973.exe, 00000000.00000002.655902349.0000000002DA1000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipFactura PO 1541973.exe, 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://wJzLSk.comFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssFactura PO 1541973.exe, 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmpfalse
                              high
                              http://kCE9JYg5iS.comFactura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Factura PO 1541973.exe, 00000004.00000003.858298741.0000000000BC4000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.org%$Factura PO 1541973.exe, 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              208.91.199.223
                              us2.smtp.mailhostbox.comUnited States
                              394695PUBLIC-DOMAIN-REGISTRYUSfalse

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:433037
                              Start date:11.06.2021
                              Start time:08:03:27
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 43s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Factura PO 1541973.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:19
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@6/5@1/1
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 104.43.139.144, 20.82.210.154, 20.54.104.15, 20.54.26.129, 2.20.142.209, 2.20.142.210, 92.122.213.194, 92.122.213.247
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dscg3.akamai.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              08:04:17API Interceptor746x Sleep call for process: Factura PO 1541973.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              208.91.199.223SAUDI ARAMCO Tender Documents - BOQ and ITB.exeGet hashmaliciousBrowse
                                0PyeqVfoHGFVl2r.exeGet hashmaliciousBrowse
                                  Urgent Contract Order GH78566484,pdf.exeGet hashmaliciousBrowse
                                    ekrrUChjXvng9Vr.exeGet hashmaliciousBrowse
                                      order 4806125050.xlsxGet hashmaliciousBrowse
                                        BP4w3lADAPfOKmI.exeGet hashmaliciousBrowse
                                          PO -TXGU5022187.xlsxGet hashmaliciousBrowse
                                            FXDmHIiz25.exeGet hashmaliciousBrowse
                                              Urgent Contract Order GH7856648,pdf.exeGet hashmaliciousBrowse
                                                003BC09180600189.exeGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Scr.Malcodegdn30.30554.exeGet hashmaliciousBrowse
                                                    MOQ FOB ORDER_________.exeGet hashmaliciousBrowse
                                                      YR1eBxhF96.exeGet hashmaliciousBrowse
                                                        Quote SEQTE00311701.xlsxGet hashmaliciousBrowse
                                                          sqQyO37l3c.exeGet hashmaliciousBrowse
                                                            Urgent RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                                                              INVOICE FOR PAYMENT_pdf____________________________________________.exeGet hashmaliciousBrowse
                                                                MOQ FOB ORDER.exeGet hashmaliciousBrowse
                                                                  Txw9tCLc1Q.exeGet hashmaliciousBrowse
                                                                    E8aAJC09lVhRGbK.exeGet hashmaliciousBrowse

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      us2.smtp.mailhostbox.comUrgent Contract Order GH7856648,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      NEW ORDER 112888#.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      SAUDI ARAMCO Tender Documents - BOQ and ITB.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      0PyeqVfoHGFVl2r.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      SecuriteInfo.com.MachineLearning.Anomalous.97.15449.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      lFccIK78FD.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      Urgent Contract Order GH78566484,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      MOQ FOB ORDER.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      JK6Ul6IKioPWJ6Y.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      ekrrUChjXvng9Vr.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      SecuriteInfo.com.Trojan.PackedNET.832.15445.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      order 4806125050.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      SecuriteInfo.com.Trojan.PackedNET.831.28325.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      G8mumaTxk5kFdBG.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      Trial order 20210609.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      BP4w3lADAPfOKmI.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      4It7P3KCyYHUWHU.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      PO -TXGU5022187.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      Bestil 5039066002128.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      COMPANY DOCUMENTS.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      PUBLIC-DOMAIN-REGISTRYUSUrgent Contract Order GH7856648,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      NEW ORDER 112888#.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      oRSxZhDFLi.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      SAUDI ARAMCO Tender Documents - BOQ and ITB.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      0PyeqVfoHGFVl2r.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      #U260e#Ufe0f Zeppelin.com AudioMessage_259-55.HTMGet hashmaliciousBrowse
                                                                      • 207.174.212.247
                                                                      SecuriteInfo.com.MachineLearning.Anomalous.97.15449.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      lFccIK78FD.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      Order10 06 2021.docGet hashmaliciousBrowse
                                                                      • 162.215.241.145
                                                                      PO187439.exeGet hashmaliciousBrowse
                                                                      • 119.18.54.126
                                                                      Urgent Contract Order GH78566484,pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      MOQ FOB ORDER.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      JK6Ul6IKioPWJ6Y.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      ekrrUChjXvng9Vr.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      SecuriteInfo.com.Trojan.PackedNET.832.15445.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      order 4806125050.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      Bank Swift.docGet hashmaliciousBrowse
                                                                      • 162.215.241.145
                                                                      SecuriteInfo.com.Trojan.PackedNET.831.28325.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      Trial order 20210609.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      BP4w3lADAPfOKmI.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223

                                                                      JA3 Fingerprints

                                                                      No context

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Factura PO 1541973.exe.log
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):1314
                                                                      Entropy (8bit):5.350128552078965
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                      MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                      SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                      SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                      SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                      C:\Users\user\AppData\Local\Temp\tmp2A03.tmp
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1643
                                                                      Entropy (8bit):5.189995397126082
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGNtn:cbhK79lNQR/rydbz9I3YODOLNdq3A
                                                                      MD5:581656AAF565B7599C874A18536B35B2
                                                                      SHA1:C24E3A41792AD6831F9E8091CC6A52D90DC07E92
                                                                      SHA-256:F5ECCB10AA1D316BF2E4EFEC8DB454A3D6CCCDE50C043EE0E1CA582A897EE11C
                                                                      SHA-512:C10C89D107C70488128EEB6D741BDFF1983972FEA38A812723412D8B2D2FD7232158C23BFF3ADDE8E6B99950F93A0305E0D975DB73FE53B752EDFD2634978744
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):952832
                                                                      Entropy (8bit):7.634813259762412
                                                                      Encrypted:false
                                                                      SSDEEP:12288:t1+m5ABVldpNU3FVYWCMWrE0ak3wIJFr8JgoD1py2JeiluZM4e/ZUdtb:tPeeFVYAi3wIYJPDD5pluNeBUdt
                                                                      MD5:429A3063DB13E84F8E0843F46B60753E
                                                                      SHA1:DE9221C73FE3610393F1F9197DFECF0896ED776C
                                                                      SHA-256:62E122A12EA4CCACE679E22B13975E1F0E476DDA8373279D99B757635C8B06DC
                                                                      SHA-512:876D20B1E4ED70710184895303799CE258F98795B41180B90FDAEDCA572EF1CD45460B5B91DEB4C11A54545C2F38D1C00BEC3B72979E30C22DDB4D9ABA5ABB0A
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 23%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 34%
                                                                      Reputation:low
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............v.... ... ....@.. ....................................@.................................$...O.... ............................................................................... ............... ..H............text...|.... ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B................X.......H........b..Lx...............$...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                                                      C:\Users\user\AppData\Roaming\lVzZfJoExG.exe:Zone.Identifier
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview: [ZoneTransfer]....ZoneId=0
                                                                      C:\Users\user\AppData\Roaming\znti2vkl.lrt\Chrome\Default\Cookies
                                                                      Process:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):0.7006690334145785
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                                                      MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                                                      SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                                                      SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                                                      SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.634813259762412
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      File name:Factura PO 1541973.exe
                                                                      File size:952832
                                                                      MD5:429a3063db13e84f8e0843f46b60753e
                                                                      SHA1:de9221c73fe3610393f1f9197dfecf0896ed776c
                                                                      SHA256:62e122a12ea4ccace679e22b13975e1f0e476dda8373279d99b757635c8b06dc
                                                                      SHA512:876d20b1e4ed70710184895303799ce258f98795b41180b90fdaedca572ef1cd45460b5b91deb4c11a54545c2f38d1c00bec3b72979e30c22ddb4d9aba5abb0a
                                                                      SSDEEP:12288:t1+m5ABVldpNU3FVYWCMWrE0ak3wIJFr8JgoD1py2JeiluZM4e/ZUdtb:tPeeFVYAi3wIYJPDD5pluNeBUdt
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P.............v.... ... ....@.. ....................................@................................

                                                                      File Icon

                                                                      Icon Hash:8c8caa8e9692aa00

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x4c0176
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x60C21B8B [Thu Jun 10 14:02:51 2021 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc01240x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x2a394.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xbffec0x1c.text
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000xbe17c0xbe200False0.949855666502370 sysV pure executable not stripped7.96018720186IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xc20000x2a3940x2a400False0.124404816938data4.17231984784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xee0000xc0x200False0.041015625data0.0776331623432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_ICON0xc22000x2326PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                      RT_ICON0xc45380x10828dBase III DBT, version number 0, next free block index 40
                                                                      RT_ICON0xd4d700x94a8data
                                                                      RT_ICON0xde2280x5488data
                                                                      RT_ICON0xe36c00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                      RT_ICON0xe78f80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                      RT_ICON0xe9eb00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                                      RT_ICON0xeaf680x988data
                                                                      RT_ICON0xeb9000x468GLS_BINARY_LSB_FIRST
                                                                      RT_GROUP_ICON0xebd780x84data
                                                                      RT_VERSION0xebe0c0x388data
                                                                      RT_MANIFEST0xec1a40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                      Imports

                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain

                                                                      Version Infos

                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightPaul Harris 2016
                                                                      Assembly Version251.2.0.0
                                                                      InternalNameConstructorInfo.exe
                                                                      FileVersion251.2.0.0
                                                                      CompanyNamePaul Harris
                                                                      LegalTrademarks
                                                                      Comments1992 Alpine A 610
                                                                      ProductNameReloadManager
                                                                      ProductVersion251.2.0.0
                                                                      FileDescriptionReloadManager
                                                                      OriginalFilenameConstructorInfo.exe

                                                                      Network Behavior

                                                                      Snort IDS Alerts

                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      06/11/21-08:06:02.993426TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49771587192.168.2.4208.91.199.223
                                                                      06/11/21-08:06:06.279511TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49772587192.168.2.4208.91.199.223

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jun 11, 2021 08:06:01.240387917 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:01.404711008 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:01.404921055 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:01.980102062 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:01.980814934 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.145400047 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.145451069 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.147583961 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.315876007 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.316389084 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.483670950 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.484386921 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.649792910 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.650073051 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.825508118 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.825818062 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.992470026 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:02.993426085 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.993542910 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.994645119 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:02.994695902 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:03.157859087 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:03.159264088 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:03.280250072 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:03.330709934 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.768742085 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.933777094 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:04.933795929 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:04.933985949 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.934179068 CEST49771587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:04.935074091 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.099284887 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.099436998 CEST58749771208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.099498987 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.270102024 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.270399094 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.434314966 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.434417009 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.434684992 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.602807999 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.603249073 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.769443035 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.769814968 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:05.934775114 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:05.935218096 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.108582973 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.109487057 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.275418997 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.279030085 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.279510975 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.279810905 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280102015 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280495882 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280710936 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.280910969 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.281122923 CEST49772587192.168.2.4208.91.199.223
                                                                      Jun 11, 2021 08:06:06.446223021 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.446441889 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.446964979 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.447500944 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.547502041 CEST58749772208.91.199.223192.168.2.4
                                                                      Jun 11, 2021 08:06:06.596929073 CEST49772587192.168.2.4208.91.199.223

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jun 11, 2021 08:04:09.735510111 CEST53497148.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:11.649197102 CEST5802853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:11.699404955 CEST53580288.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:16.222839117 CEST5309753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:16.275559902 CEST53530978.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:17.100451946 CEST4925753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:17.153492928 CEST53492578.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:18.480669022 CEST6238953192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:18.531339884 CEST53623898.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:19.458003044 CEST4991053192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:19.511290073 CEST53499108.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:20.500994921 CEST5585453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:20.553800106 CEST53558548.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:21.511910915 CEST6454953192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:21.564140081 CEST53645498.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:22.466965914 CEST6315353192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:22.517554045 CEST53631538.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:23.354130030 CEST5299153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:23.414649963 CEST53529918.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:24.302028894 CEST5370053192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:24.356265068 CEST53537008.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:25.222007990 CEST5172653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:25.281595945 CEST53517268.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:26.335386038 CEST5679453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:26.390681028 CEST53567948.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:27.319438934 CEST5653453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:27.370568991 CEST53565348.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:28.258600950 CEST5662753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:28.317204952 CEST53566278.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:30.816145897 CEST5662153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:30.867733955 CEST53566218.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:31.863389015 CEST6311653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:31.921552896 CEST53631168.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:34.004097939 CEST6407853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:34.064551115 CEST53640788.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:36.558356047 CEST6480153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:36.608555079 CEST53648018.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:38.909733057 CEST6172153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:38.972330093 CEST53617218.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:55.652265072 CEST5125553192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:55.793745041 CEST53512558.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:56.362415075 CEST6152253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:56.451003075 CEST5233753192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:56.504664898 CEST53615228.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:56.521023035 CEST53523378.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:57.255492926 CEST5504653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:57.317070961 CEST53550468.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:57.803144932 CEST4961253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:57.864692926 CEST53496128.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:58.480649948 CEST4928553192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:58.544281960 CEST53492858.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:59.142040968 CEST5060153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:59.203213930 CEST53506018.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:04:59.832164049 CEST6087553192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:04:59.893954992 CEST53608758.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:00.731894016 CEST5644853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:00.795730114 CEST53564488.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:01.641452074 CEST5917253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:01.704530954 CEST53591728.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:02.185380936 CEST6242053192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:02.247342110 CEST53624208.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:04.751456022 CEST6057953192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:04.813363075 CEST53605798.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:14.338932037 CEST5018353192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:14.343724012 CEST6153153192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:14.412621975 CEST53615318.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:14.413042068 CEST53501838.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:17.289112091 CEST4922853192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:17.351978064 CEST53492288.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:48.938035965 CEST5979453192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:48.996527910 CEST53597948.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:05:50.675123930 CEST5591653192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:05:50.746380091 CEST53559168.8.8.8192.168.2.4
                                                                      Jun 11, 2021 08:06:01.064519882 CEST5275253192.168.2.48.8.8.8
                                                                      Jun 11, 2021 08:06:01.126252890 CEST53527528.8.8.8192.168.2.4

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Jun 11, 2021 08:06:01.064519882 CEST192.168.2.48.8.8.80xaf7Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                      Jun 11, 2021 08:06:01.126252890 CEST8.8.8.8192.168.2.40xaf7No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)

                                                                      SMTP Packets

                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Jun 11, 2021 08:06:01.980102062 CEST58749771208.91.199.223192.168.2.4220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                      Jun 11, 2021 08:06:01.980814934 CEST49771587192.168.2.4208.91.199.223EHLO 247525
                                                                      Jun 11, 2021 08:06:02.145451069 CEST58749771208.91.199.223192.168.2.4250-us2.outbound.mailhostbox.com
                                                                      250-PIPELINING
                                                                      250-SIZE 41648128
                                                                      250-VRFY
                                                                      250-ETRN
                                                                      250-STARTTLS
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-AUTH=PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 DSN
                                                                      Jun 11, 2021 08:06:02.147583961 CEST49771587192.168.2.4208.91.199.223AUTH login ZHViYWlAc2t5Y29tZXguY29t
                                                                      Jun 11, 2021 08:06:02.315876007 CEST58749771208.91.199.223192.168.2.4334 UGFzc3dvcmQ6
                                                                      Jun 11, 2021 08:06:02.483670950 CEST58749771208.91.199.223192.168.2.4235 2.7.0 Authentication successful
                                                                      Jun 11, 2021 08:06:02.484386921 CEST49771587192.168.2.4208.91.199.223MAIL FROM:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:02.649792910 CEST58749771208.91.199.223192.168.2.4250 2.1.0 Ok
                                                                      Jun 11, 2021 08:06:02.650073051 CEST49771587192.168.2.4208.91.199.223RCPT TO:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:02.825508118 CEST58749771208.91.199.223192.168.2.4250 2.1.5 Ok
                                                                      Jun 11, 2021 08:06:02.825818062 CEST49771587192.168.2.4208.91.199.223DATA
                                                                      Jun 11, 2021 08:06:02.992470026 CEST58749771208.91.199.223192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                                                      Jun 11, 2021 08:06:02.994695902 CEST49771587192.168.2.4208.91.199.223.
                                                                      Jun 11, 2021 08:06:03.280250072 CEST58749771208.91.199.223192.168.2.4250 2.0.0 Ok: queued as B8ED218586B
                                                                      Jun 11, 2021 08:06:04.768742085 CEST49771587192.168.2.4208.91.199.223QUIT
                                                                      Jun 11, 2021 08:06:04.933777094 CEST58749771208.91.199.223192.168.2.4221 2.0.0 Bye
                                                                      Jun 11, 2021 08:06:05.270102024 CEST58749772208.91.199.223192.168.2.4220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                      Jun 11, 2021 08:06:05.270399094 CEST49772587192.168.2.4208.91.199.223EHLO 247525
                                                                      Jun 11, 2021 08:06:05.434417009 CEST58749772208.91.199.223192.168.2.4250-us2.outbound.mailhostbox.com
                                                                      250-PIPELINING
                                                                      250-SIZE 41648128
                                                                      250-VRFY
                                                                      250-ETRN
                                                                      250-STARTTLS
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-AUTH=PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 DSN
                                                                      Jun 11, 2021 08:06:05.434684992 CEST49772587192.168.2.4208.91.199.223AUTH login ZHViYWlAc2t5Y29tZXguY29t
                                                                      Jun 11, 2021 08:06:05.602807999 CEST58749772208.91.199.223192.168.2.4334 UGFzc3dvcmQ6
                                                                      Jun 11, 2021 08:06:05.769443035 CEST58749772208.91.199.223192.168.2.4235 2.7.0 Authentication successful
                                                                      Jun 11, 2021 08:06:05.769814968 CEST49772587192.168.2.4208.91.199.223MAIL FROM:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:05.934775114 CEST58749772208.91.199.223192.168.2.4250 2.1.0 Ok
                                                                      Jun 11, 2021 08:06:05.935218096 CEST49772587192.168.2.4208.91.199.223RCPT TO:<dubai@skycomex.com>
                                                                      Jun 11, 2021 08:06:06.108582973 CEST58749772208.91.199.223192.168.2.4250 2.1.5 Ok
                                                                      Jun 11, 2021 08:06:06.109487057 CEST49772587192.168.2.4208.91.199.223DATA
                                                                      Jun 11, 2021 08:06:06.275418997 CEST58749772208.91.199.223192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                                                      Jun 11, 2021 08:06:06.281122923 CEST49772587192.168.2.4208.91.199.223.
                                                                      Jun 11, 2021 08:06:06.547502041 CEST58749772208.91.199.223192.168.2.4250 2.0.0 Ok: queued as 09EC61857D9

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:08:04:16
                                                                      Start date:11/06/2021
                                                                      Path:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Users\user\Desktop\Factura PO 1541973.exe'
                                                                      Imagebase:0x960000
                                                                      File size:952832 bytes
                                                                      MD5 hash:429A3063DB13E84F8E0843F46B60753E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.657464491.0000000003FA5000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.655976100.0000000002DDB000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:08:04:20
                                                                      Start date:11/06/2021
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lVzZfJoExG' /XML 'C:\Users\user\AppData\Local\Temp\tmp2A03.tmp'
                                                                      Imagebase:0x9e0000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:04:20
                                                                      Start date:11/06/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff724c50000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:08:04:21
                                                                      Start date:11/06/2021
                                                                      Path:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\Desktop\Factura PO 1541973.exe
                                                                      Imagebase:0x610000
                                                                      File size:952832 bytes
                                                                      MD5 hash:429A3063DB13E84F8E0843F46B60753E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.654058658.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.910233629.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.912086324.0000000002A91000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >