Loading ...

Play interactive tourEdit tour

Analysis Report Proforma Invoice No. 14214.exe

Overview

General Information

Sample Name:Proforma Invoice No. 14214.exe
Analysis ID:433051
MD5:7c8ebff62083aaaa70e6ca8311776afa
SHA1:ae068ca1a02edd4f2e50657a1f223e86f1bbe499
SHA256:70840e5d766990e38d2a5e209106d19fb19e9c1b77fc2eb1b870f698da1f1a84
Tags:exe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Process Start Without DLL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • Proforma Invoice No. 14214.exe (PID: 6440 cmdline: 'C:\Users\user\Desktop\Proforma Invoice No. 14214.exe' MD5: 7C8EBFF62083AAAA70E6CA8311776AFA)
    • RegSvcs.exe (PID: 6564 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • NXLun.exe (PID: 6048 cmdline: 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • NXLun.exe (PID: 5620 cmdline: 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 6176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "anando@citechco.net", "Password": "Webana@321#", "Host": "mail.citechco.net"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000002.605727213.00000000032DB000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.Proforma Invoice No. 14214.exe.3e01450.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Process Start Without DLLShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\Proforma Invoice No. 14214.exe' , ParentImage: C:\Users\user\Desktop\Proforma Invoice No. 14214.exe, ParentProcessId: 6440, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6564
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\Proforma Invoice No. 14214.exe' , ParentImage: C:\Users\user\Desktop\Proforma Invoice No. 14214.exe, ParentProcessId: 6440, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6564

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "anando@citechco.net", "Password": "Webana@321#", "Host": "mail.citechco.net"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Proforma Invoice No. 14214.exeVirustotal: Detection: 37%Perma Link
                      Source: Proforma Invoice No. 14214.exeReversingLabs: Detection: 28%
                      Machine Learning detection for sampleShow sources
                      Source: Proforma Invoice No. 14214.exeJoe Sandbox ML: detected
                      Source: 2.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: Proforma Invoice No. 14214.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: Proforma Invoice No. 14214.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: ITypeLib.pdbh source: Proforma Invoice No. 14214.exe
                      Source: Binary string: RegSvcs.pdb, source: NXLun.exe, 0000000A.00000002.418746456.0000000000692000.00000002.00020000.sdmp, NXLun.exe, 0000000D.00000002.440030386.00000000003E2000.00000002.00020000.sdmp, NXLun.exe.2.dr
                      Source: Binary string: ITypeLib.pdb source: Proforma Invoice No. 14214.exe
                      Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: NXLun.exe, 0000000A.00000002.419412855.0000000002B40000.00000002.00000001.sdmp, NXLun.exe, 0000000D.00000002.440906669.0000000004BE0000.00000002.00000001.sdmp
                      Source: Binary string: RegSvcs.pdb source: NXLun.exe, NXLun.exe.2.dr
                      Source: global trafficTCP traffic: 192.168.2.6:49742 -> 203.191.33.181:587
                      Source: global trafficTCP traffic: 192.168.2.6:49742 -> 203.191.33.181:587
                      Source: unknownDNS traffic detected: queries for: mail.citechco.net
                      Source: RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: RegSvcs.exe, 00000002.00000002.605727213.00000000032DB000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.606044540.0000000003355000.00000004.00000001.sdmpString found in binary or memory: http://Ustq4cbAUDG33rrxc.org
                      Source: RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: RegSvcs.exe, 00000002.00000002.610640634.000000000638F000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                      Source: RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpString found in binary or memory: http://kRGqzl.com
                      Source: RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpString found in binary or memory: http://mail.citechco.net
                      Source: RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352422358.0000000002D41000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bEB1FE0F0u002dD3F7u002d4CA7u002dA6E6u002d30D966CA64F5u007d/u0035A9A7DD3u002dC878u002d49AAu002dA3CCu002d93748952BFF0.csLarge array initialization: .cctor: array initializer size 11946
                      Source: 2.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bEB1FE0F0u002dD3F7u002d4CA7u002dA6E6u002d30D966CA64F5u007d/u0035A9A7DD3u002dC878u002d49AAu002dA3CCu002d93748952BFF0.csLarge array initialization: .cctor: array initializer size 11946
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: Proforma Invoice No. 14214.exe
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_006D8024
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_006D2696
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_0122C788
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_0122AD88
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02A30281
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02A31945
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02A30239
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02A30268
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02A30007
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02A30040
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D1A130
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D1A120
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D19EC0
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D19EBF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0162BD70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016205EF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01624B80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016296F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01628E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016253C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016252CA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016B47A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016B4730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016B4790
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016B46B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016BD670
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06546508
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06546850
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_065490D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06547120
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06895690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0689A208
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0654BEC0 appears 48 times
                      Source: Proforma Invoice No. 14214.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.350087012.00000000007AE000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameITypeLib.exe< vs Proforma Invoice No. 14214.exe
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352422358.0000000002D41000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamefIuXDFbZUwhAPkOKPtFUUkLyKIoWxpLX.exe4 vs Proforma Invoice No. 14214.exe
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.353965910.0000000003EBE000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs Proforma Invoice No. 14214.exe
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKygo.dll* vs Proforma Invoice No. 14214.exe
                      Source: Proforma Invoice No. 14214.exeBinary or memory string: OriginalFilenameITypeLib.exe< vs Proforma Invoice No. 14214.exe
                      Source: Proforma Invoice No. 14214.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: Proforma Invoice No. 14214.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Proforma Invoice No. 14214.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: Proforma Invoice No. 14214.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.0.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.0.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.0.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.0.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0654CC4C UserClientDllInitialize,KiUserExceptionDispatcher,GetFirmwareType,GetDateFormatAWorker,ClientThreadSetup,SendMessageTimeoutW,GetMessageW,CreateToolhelp32Snapshot,SetThreadDpiAwarenessContext,SetClipboardData,KiUserExceptionDispatcher,CreateActCtxWWorker,KiUserExceptionDispatcher,SetXStateFeaturesMask,LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Proforma Invoice No. 14214.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeMutant created: \Sessions\1\BaseNamedObjects\XxuFpYNIkvOt
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6176:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5116:120:WilError_01
                      Source: Proforma Invoice No. 14214.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: Proforma Invoice No. 14214.exeVirustotal: Detection: 37%
                      Source: Proforma Invoice No. 14214.exeReversingLabs: Detection: 28%
                      Source: unknownProcess created: C:\Users\user\Desktop\Proforma Invoice No. 14214.exe 'C:\Users\user\Desktop\Proforma Invoice No. 14214.exe'
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe 'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Proforma Invoice No. 14214.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Proforma Invoice No. 14214.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Proforma Invoice No. 14214.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: ITypeLib.pdbh source: Proforma Invoice No. 14214.exe
                      Source: Binary string: RegSvcs.pdb, source: NXLun.exe, 0000000A.00000002.418746456.0000000000692000.00000002.00020000.sdmp, NXLun.exe, 0000000D.00000002.440030386.00000000003E2000.00000002.00020000.sdmp, NXLun.exe.2.dr
                      Source: Binary string: ITypeLib.pdb source: Proforma Invoice No. 14214.exe
                      Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: NXLun.exe, 0000000A.00000002.419412855.0000000002B40000.00000002.00000001.sdmp, NXLun.exe, 0000000D.00000002.440906669.0000000004BE0000.00000002.00000001.sdmp
                      Source: Binary string: RegSvcs.pdb source: NXLun.exe, NXLun.exe.2.dr

                      Data Obfuscation:

                      barindex
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: Proforma Invoice No. 14214.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 0.2.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: 0.0.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_0122EC7A push eax; ret
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D18351 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D18369 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D181ED pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D186A8 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D1F613 push cs; ret
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D137B8 push edx; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D1F707 push edx; ret
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D18444 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D1846F pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D12428 push edx; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D1842C pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D16547 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17AD8 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D14AF0 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17AB4 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D129EF pushad ; ret
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17E56 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17E44 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17E7A pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17E6E pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17E13 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17F38 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17F26 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17CBA pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17D80 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17DAB pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17D57 pushad ; retf
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeCode function: 0_2_02D17D68 pushad ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016234EC push eax; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0162ECF1 push es; ret
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85165302364
                      Source: Proforma Invoice No. 14214.exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'jPJmt4', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 0.2.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'jPJmt4', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: 0.0.Proforma Invoice No. 14214.exe.6d0000.0.unpack, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'jPJmt4', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NXLunJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run NXLunJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Proforma Invoice No. 14214.exe PID: 6440, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1184
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8673
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exe TID: 6444Thread sleep time: -103006s >= -30000s
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exe TID: 6604Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe TID: 6388Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe TID: 6292Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeThread delayed: delay time: 103006
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeThread delayed: delay time: 922337203685477
                      Source: RegSvcs.exe, 00000002.00000002.610252863.0000000006160000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: RegSvcs.exe, 00000002.00000002.610252863.0000000006160000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: RegSvcs.exe, 00000002.00000002.610252863.0000000006160000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Proforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: RegSvcs.exe, 00000002.00000002.610640634.000000000638F000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: RegSvcs.exe, 00000002.00000002.610252863.0000000006160000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01627190 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: RegSvcs.exe, 00000002.00000002.604756079.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 00000002.00000002.604756079.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 00000002.00000002.604756079.0000000001A60000.00000002.00000001.sdmpBinary or memory string: &Program Manager
                      Source: RegSvcs.exe, 00000002.00000002.604756079.0000000001A60000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeQueries volume information: C:\Users\user\Desktop\Proforma Invoice No. 14214.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Users\user\AppData\Roaming\NXLun\NXLun.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\NXLun\NXLun.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06545594 GetUserNameW,
                      Source: C:\Users\user\Desktop\Proforma Invoice No. 14214.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.605727213.00000000032DB000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Proforma Invoice No. 14214.exe PID: 6440, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6564, type: MEMORY
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6564, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.605727213.00000000032DB000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Proforma Invoice No. 14214.exe PID: 6440, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6564, type: MEMORY
                      Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Proforma Invoice No. 14214.exe.3e01450.1.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection12File and Directory Permissions Modification1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information11Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information3NTDSSecurity Software Discovery211Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing13LSA SecretsVirtualization/Sandbox Evasion131SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsProcess Discovery3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection12Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Proforma Invoice No. 14214.exe37%VirustotalBrowse
                      Proforma Invoice No. 14214.exe28%ReversingLabsWin32.Trojan.AgentTesla
                      Proforma Invoice No. 14214.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\NXLun\NXLun.exe0%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\NXLun\NXLun.exe0%ReversingLabs

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://mail.citechco.net0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://kRGqzl.com0%Avira URL Cloudsafe
                      http://Ustq4cbAUDG33rrxc.org0%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.citechco.net
                      203.191.33.181
                      truetrue
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSRegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://sectigo.com/CPS0RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0RegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://mail.citechco.netRegSvcs.exe, 00000002.00000002.605929038.000000000332A000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://kRGqzl.comRegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://Ustq4cbAUDG33rrxc.orgRegSvcs.exe, 00000002.00000002.605727213.00000000032DB000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000002.606044540.0000000003355000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameProforma Invoice No. 14214.exe, 00000000.00000002.352422358.0000000002D41000.00000004.00000001.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipProforma Invoice No. 14214.exe, 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, RegSvcs.exe, 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssProforma Invoice No. 14214.exe, 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmpfalse
                            high
                            https://api.ipify.org%$RegSvcs.exe, 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            203.191.33.181
                            mail.citechco.netBangladesh
                            17471CYBERNET-BD-ASGrameenCybernetLtdBangladeshASforlocatrue

                            General Information

                            Joe Sandbox Version:32.0.0 Black Diamond
                            Analysis ID:433051
                            Start date:11.06.2021
                            Start time:08:18:21
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 10m 23s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:Proforma Invoice No. 14214.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:26
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.adwa.spyw.evad.winEXE@7/6@2/1
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 0.7% (good quality ratio 0.4%)
                            • Quality average: 41.6%
                            • Quality standard deviation: 42.1%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                            • Excluded IPs from analysis (whitelisted): 104.42.151.234, 92.122.145.220, 168.61.161.212, 20.49.157.6, 20.54.104.15, 20.54.26.129, 92.122.213.247, 92.122.213.194, 23.218.208.56, 20.50.102.62
                            • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            08:19:18API Interceptor1x Sleep call for process: Proforma Invoice No. 14214.exe modified
                            08:19:32API Interceptor744x Sleep call for process: RegSvcs.exe modified
                            08:19:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run NXLun C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                            08:19:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run NXLun C:\Users\user\AppData\Roaming\NXLun\NXLun.exe

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            203.191.33.181BL COPY.exeGet hashmaliciousBrowse
                              Details.exeGet hashmaliciousBrowse

                                Domains

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                mail.citechco.netBL COPY.exeGet hashmaliciousBrowse
                                • 203.191.33.181

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                CYBERNET-BD-ASGrameenCybernetLtdBangladeshASforlocaBL COPY.exeGet hashmaliciousBrowse
                                • 203.191.33.181
                                wixx.exeGet hashmaliciousBrowse
                                • 122.99.102.87

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                C:\Users\user\AppData\Roaming\NXLun\NXLun.exeKCTC International Ltd.exeGet hashmaliciousBrowse
                                  NEW PO#70-02110-00739.exeGet hashmaliciousBrowse
                                    New quote.exeGet hashmaliciousBrowse
                                      Bank payment information.exeGet hashmaliciousBrowse
                                        MESCO TQZ24 QUOTE.exeGet hashmaliciousBrowse
                                          SWIFT Msg of USD 78,000.exeGet hashmaliciousBrowse
                                            OM PHOENIX TRADERS.exeGet hashmaliciousBrowse
                                              ORDER #2348478.exeGet hashmaliciousBrowse
                                                1029BA046DF67EE328AD9D21BFD1E6D31C5CEDC4D4EAD.exeGet hashmaliciousBrowse
                                                  Quotation 2000051165.exeGet hashmaliciousBrowse
                                                    IMG-20191224-WA0050.jpg.exeGet hashmaliciousBrowse
                                                      Note0093746573.exeGet hashmaliciousBrowse
                                                        RYJzamn1HwAEPyy.exeGet hashmaliciousBrowse
                                                          11.exeGet hashmaliciousBrowse
                                                            OM PHOENIX TRADERS.exeGet hashmaliciousBrowse
                                                              NEW Quotation.exeGet hashmaliciousBrowse
                                                                tB15iC3ImLK3MFX.exeGet hashmaliciousBrowse
                                                                  Bank Details.exeGet hashmaliciousBrowse
                                                                    swift copy.exeGet hashmaliciousBrowse
                                                                      Purchase Order #5038.exeGet hashmaliciousBrowse

                                                                        Created / dropped Files

                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NXLun.exe.log
                                                                        Process:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):142
                                                                        Entropy (8bit):5.090621108356562
                                                                        Encrypted:false
                                                                        SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                        MD5:8C0458BB9EA02D50565175E38D577E35
                                                                        SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                        SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                        SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                        Malicious:false
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Proforma Invoice No. 14214.exe.log
                                                                        Process:C:\Users\user\Desktop\Proforma Invoice No. 14214.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1314
                                                                        Entropy (8bit):5.350128552078965
                                                                        Encrypted:false
                                                                        SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                        MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                        SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                        SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                        SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                        Malicious:true
                                                                        Reputation:high, very likely benign file
                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                        C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):45152
                                                                        Entropy (8bit):6.149629800481177
                                                                        Encrypted:false
                                                                        SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                        MD5:2867A3817C9245F7CF518524DFD18F28
                                                                        SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                        SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                        SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Joe Sandbox View:
                                                                        • Filename: KCTC International Ltd.exe, Detection: malicious, Browse
                                                                        • Filename: NEW PO#70-02110-00739.exe, Detection: malicious, Browse
                                                                        • Filename: New quote.exe, Detection: malicious, Browse
                                                                        • Filename: Bank payment information.exe, Detection: malicious, Browse
                                                                        • Filename: MESCO TQZ24 QUOTE.exe, Detection: malicious, Browse
                                                                        • Filename: SWIFT Msg of USD 78,000.exe, Detection: malicious, Browse
                                                                        • Filename: OM PHOENIX TRADERS.exe, Detection: malicious, Browse
                                                                        • Filename: ORDER #2348478.exe, Detection: malicious, Browse
                                                                        • Filename: 1029BA046DF67EE328AD9D21BFD1E6D31C5CEDC4D4EAD.exe, Detection: malicious, Browse
                                                                        • Filename: Quotation 2000051165.exe, Detection: malicious, Browse
                                                                        • Filename: IMG-20191224-WA0050.jpg.exe, Detection: malicious, Browse
                                                                        • Filename: Note0093746573.exe, Detection: malicious, Browse
                                                                        • Filename: RYJzamn1HwAEPyy.exe, Detection: malicious, Browse
                                                                        • Filename: 11.exe, Detection: malicious, Browse
                                                                        • Filename: OM PHOENIX TRADERS.exe, Detection: malicious, Browse
                                                                        • Filename: NEW Quotation.exe, Detection: malicious, Browse
                                                                        • Filename: tB15iC3ImLK3MFX.exe, Detection: malicious, Browse
                                                                        • Filename: Bank Details.exe, Detection: malicious, Browse
                                                                        • Filename: swift copy.exe, Detection: malicious, Browse
                                                                        • Filename: Purchase Order #5038.exe, Detection: malicious, Browse
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                        C:\Windows\System32\drivers\etc\hosts
                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):11
                                                                        Entropy (8bit):2.663532754804255
                                                                        Encrypted:false
                                                                        SSDEEP:3:iLE:iLE
                                                                        MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                        SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                        SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                        SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                        Malicious:true
                                                                        Reputation:high, very likely benign file
                                                                        Preview: ..127.0.0.1
                                                                        \Device\ConDrv
                                                                        Process:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1141
                                                                        Entropy (8bit):4.44831826838854
                                                                        Encrypted:false
                                                                        SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                        MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                        SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                        SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                        SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                        Malicious:false
                                                                        Preview: Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c

                                                                        Static File Info

                                                                        General

                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):7.502629999603093
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                        File name:Proforma Invoice No. 14214.exe
                                                                        File size:948224
                                                                        MD5:7c8ebff62083aaaa70e6ca8311776afa
                                                                        SHA1:ae068ca1a02edd4f2e50657a1f223e86f1bbe499
                                                                        SHA256:70840e5d766990e38d2a5e209106d19fb19e9c1b77fc2eb1b870f698da1f1a84
                                                                        SHA512:5bbd2c6bbed6550e25328520655ec2f6604cfb5cb8a13c11299f040dfceab258fc7e83f58301027ca6eb2ccb5be7e7cab9d6c882e98fa89be163d00e1e03ed9a
                                                                        SSDEEP:12288:etYPbbR3qpPHzhM+2KObZUQW+v5JKAn77Oc9NGlqeEsXaYXZM4e/ZUdtb:eWjbo1HaMObeQHRJKjINUaCNeBUdt
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...O..`................................. ........@.. ....................................@................................

                                                                        File Icon

                                                                        Icon Hash:8c8caa8e9692aa00

                                                                        Static PE Info

                                                                        General

                                                                        Entrypoint:0x4bea8e
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                        Time Stamp:0x60C2934F [Thu Jun 10 22:33:51 2021 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:v4.0.30319
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                        Entrypoint Preview

                                                                        Instruction
                                                                        jmp dword ptr [00402000h]
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al

                                                                        Data Directories

                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xbea400x4b.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x2a378.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xbe9ff0x1c.text
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text

                                                                        Sections

                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x20000xbca940xbcc00False0.894804170116data7.85165302364IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                        .sdata0xc00000x1e80x200False0.859375data6.60940178525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0xc20000x2a3780x2a400False0.124329696746data4.17095008469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0xee0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                        Resources

                                                                        NameRVASizeTypeLanguageCountry
                                                                        RT_ICON0xc22b00x2326PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                        RT_ICON0xc45d80x10828dBase III DBT, version number 0, next free block index 40
                                                                        RT_ICON0xd4e000x94a8data
                                                                        RT_ICON0xde2a80x5488data
                                                                        RT_ICON0xe37300x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                        RT_ICON0xe79580x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                        RT_ICON0xe9f000x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                                        RT_ICON0xeafa80x988data
                                                                        RT_ICON0xeb9300x468GLS_BINARY_LSB_FIRST
                                                                        RT_GROUP_ICON0xebd980x84data
                                                                        RT_VERSION0xebe1c0x370data
                                                                        RT_MANIFEST0xec18c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                        Imports

                                                                        DLLImport
                                                                        mscoree.dll_CorExeMain

                                                                        Version Infos

                                                                        DescriptionData
                                                                        Translation0x0000 0x04b0
                                                                        LegalCopyrightPaul Harris 2016
                                                                        Assembly Version251.2.0.0
                                                                        InternalNameITypeLib.exe
                                                                        FileVersion251.2.0.0
                                                                        CompanyNamePaul Harris
                                                                        LegalTrademarks
                                                                        Comments1992 Alpine A 610
                                                                        ProductNameReloadManager
                                                                        ProductVersion251.2.0.0
                                                                        FileDescriptionReloadManager
                                                                        OriginalFilenameITypeLib.exe

                                                                        Network Behavior

                                                                        Snort IDS Alerts

                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                        06/11/21-08:21:10.317294ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.68.8.8.8

                                                                        Network Port Distribution

                                                                        TCP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jun 11, 2021 08:21:10.467061043 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:10.706824064 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:10.707088947 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:11.932676077 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:11.933680058 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:12.173532009 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:12.173907995 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:12.417260885 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:12.470959902 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:12.499449015 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:12.748102903 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:12.748161077 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:12.748199940 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:12.748238087 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:12.748445034 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:12.751140118 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:12.751229048 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:12.791101933 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:13.030870914 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:13.080358028 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:13.314187050 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:13.553812981 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:13.556118011 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:13.795675993 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:13.796591997 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:14.049245119 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:14.051728010 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:14.290824890 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:14.291640043 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:14.543005943 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:14.543675900 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:14.784476042 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:14.786951065 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:14.787322044 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:14.788345098 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:14.788610935 CEST49742587192.168.2.6203.191.33.181
                                                                        Jun 11, 2021 08:21:15.027260065 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:15.027287960 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:15.027302027 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:15.027614117 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:15.029485941 CEST58749742203.191.33.181192.168.2.6
                                                                        Jun 11, 2021 08:21:15.080554008 CEST49742587192.168.2.6203.191.33.181

                                                                        UDP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jun 11, 2021 08:19:08.253485918 CEST53583778.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:10.504858971 CEST5507453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:10.567214966 CEST53550748.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:11.104419947 CEST5451353192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:11.165437937 CEST53545138.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:12.450514078 CEST6204453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:12.500380039 CEST53620448.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:14.522960901 CEST6379153192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:14.573014975 CEST53637918.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:15.830204964 CEST6426753192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:15.880462885 CEST53642678.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:18.053216934 CEST4944853192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:18.103591919 CEST53494488.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:20.305211067 CEST6034253192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:20.355670929 CEST53603428.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:21.544035912 CEST6134653192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:21.594537020 CEST53613468.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:23.430344105 CEST5177453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:23.490246058 CEST53517748.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:24.648219109 CEST5602353192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:24.698667049 CEST53560238.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:28.962219954 CEST5838453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:29.014580965 CEST53583848.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:32.045017958 CEST6026153192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:32.096185923 CEST53602618.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:34.912133932 CEST5606153192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:34.965393066 CEST53560618.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:36.116363049 CEST5833653192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:36.166959047 CEST53583368.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:37.077007055 CEST5378153192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:37.127039909 CEST53537818.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:38.161173105 CEST5406453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:38.211272955 CEST53540648.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:39.359008074 CEST5281153192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:39.409537077 CEST53528118.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:40.617821932 CEST5529953192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:40.672638893 CEST53552998.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:19:44.969963074 CEST6374553192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:19:45.030467987 CEST53637458.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:09.193252087 CEST5005553192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:09.344067097 CEST53500558.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:10.059835911 CEST6137453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:10.121409893 CEST53613748.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:10.721240044 CEST5033953192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:10.853936911 CEST53503398.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:11.198224068 CEST6330753192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:11.271945953 CEST4969453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:11.275242090 CEST53633078.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:11.330400944 CEST53496948.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:11.929248095 CEST5498253192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:11.992943048 CEST53549828.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:12.546894073 CEST5001053192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:12.610701084 CEST53500108.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:13.035540104 CEST6371853192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:13.094413042 CEST53637188.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:13.878297091 CEST6211653192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:13.939054012 CEST53621168.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:14.827891111 CEST6381653192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:14.886362076 CEST53638168.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:15.442689896 CEST5501453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:15.501132011 CEST53550148.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:27.870873928 CEST6220853192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:27.930785894 CEST53622088.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:44.368077993 CEST5757453192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:44.428579092 CEST53575748.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:52.413651943 CEST5181853192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:52.466622114 CEST53518188.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:20:54.123683929 CEST5662853192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:20:54.199358940 CEST53566288.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:21:08.863543987 CEST6077853192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:21:09.894810915 CEST6077853192.168.2.68.8.8.8
                                                                        Jun 11, 2021 08:21:10.311168909 CEST53607788.8.8.8192.168.2.6
                                                                        Jun 11, 2021 08:21:10.317176104 CEST53607788.8.8.8192.168.2.6

                                                                        ICMP Packets

                                                                        TimestampSource IPDest IPChecksumCodeType
                                                                        Jun 11, 2021 08:21:10.317293882 CEST192.168.2.68.8.8.8d007(Port unreachable)Destination Unreachable

                                                                        DNS Queries

                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                        Jun 11, 2021 08:21:08.863543987 CEST192.168.2.68.8.8.80x1974Standard query (0)mail.citechco.netA (IP address)IN (0x0001)
                                                                        Jun 11, 2021 08:21:09.894810915 CEST192.168.2.68.8.8.80x1974Standard query (0)mail.citechco.netA (IP address)IN (0x0001)

                                                                        DNS Answers

                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                        Jun 11, 2021 08:21:10.311168909 CEST8.8.8.8192.168.2.60x1974No error (0)mail.citechco.net203.191.33.181A (IP address)IN (0x0001)
                                                                        Jun 11, 2021 08:21:10.317176104 CEST8.8.8.8192.168.2.60x1974No error (0)mail.citechco.net203.191.33.181A (IP address)IN (0x0001)

                                                                        SMTP Packets

                                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                                        Jun 11, 2021 08:21:11.932676077 CEST58749742203.191.33.181192.168.2.6220-cpns2.citechco.net ESMTP Exim 4.94.2 #2 Fri, 11 Jun 2021 12:21:11 +0600
                                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                                        220 and/or bulk e-mail.
                                                                        Jun 11, 2021 08:21:11.933680058 CEST49742587192.168.2.6203.191.33.181EHLO 390120
                                                                        Jun 11, 2021 08:21:12.173532009 CEST58749742203.191.33.181192.168.2.6250-cpns2.citechco.net Hello 390120 [84.17.52.18]
                                                                        250-SIZE 52428800
                                                                        250-8BITMIME
                                                                        250-DSN
                                                                        250-PIPELINING
                                                                        250-PIPE_CONNECT
                                                                        250-STARTTLS
                                                                        250 HELP
                                                                        Jun 11, 2021 08:21:12.173907995 CEST49742587192.168.2.6203.191.33.181STARTTLS
                                                                        Jun 11, 2021 08:21:12.417260885 CEST58749742203.191.33.181192.168.2.6220 TLS go ahead

                                                                        Code Manipulations

                                                                        Statistics

                                                                        Behavior

                                                                        Click to jump to process

                                                                        System Behavior

                                                                        General

                                                                        Start time:08:19:15
                                                                        Start date:11/06/2021
                                                                        Path:C:\Users\user\Desktop\Proforma Invoice No. 14214.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\Desktop\Proforma Invoice No. 14214.exe'
                                                                        Imagebase:0x6d0000
                                                                        File size:948224 bytes
                                                                        MD5 hash:7C8EBFF62083AAAA70E6CA8311776AFA
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.353706824.0000000003D49000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.352826103.0000000002D7F000.00000004.00000001.sdmp, Author: Joe Security
                                                                        Reputation:low

                                                                        General

                                                                        Start time:08:19:20
                                                                        Start date:11/06/2021
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        Imagebase:0xd70000
                                                                        File size:45152 bytes
                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.344864623.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.603094924.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.605727213.00000000032DB000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.604865648.0000000002FC1000.00000004.00000001.sdmp, Author: Joe Security
                                                                        Reputation:high

                                                                        General

                                                                        Start time:08:19:54
                                                                        Start date:11/06/2021
                                                                        Path:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                                                                        Imagebase:0x690000
                                                                        File size:45152 bytes
                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Antivirus matches:
                                                                        • Detection: 0%, Metadefender, Browse
                                                                        • Detection: 0%, ReversingLabs
                                                                        Reputation:high

                                                                        General

                                                                        Start time:08:19:54
                                                                        Start date:11/06/2021
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff61de10000
                                                                        File size:625664 bytes
                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:08:20:02
                                                                        Start date:11/06/2021
                                                                        Path:C:\Users\user\AppData\Roaming\NXLun\NXLun.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\AppData\Roaming\NXLun\NXLun.exe'
                                                                        Imagebase:0x3e0000
                                                                        File size:45152 bytes
                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Reputation:high

                                                                        General

                                                                        Start time:08:20:04
                                                                        Start date:11/06/2021
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff61de10000
                                                                        File size:625664 bytes
                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        Disassembly

                                                                        Code Analysis

                                                                        Reset < >