Loading ...

Play interactive tourEdit tour

Analysis Report Following abusive email letter .exe

Overview

General Information

Sample Name:Following abusive email letter .exe
Analysis ID:433262
MD5:368a0ec11590e137b1cd5405cd0591db
SHA1:48c11cb189d44ae0c30b32f0aba41d4c52568c44
SHA256:c0b43d27c73d2a64f25a1e095a10dcf339635d9c48c6d612b37eba084341e103
Tags:exe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Process Start Without DLL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • Following abusive email letter .exe (PID: 3888 cmdline: 'C:\Users\user\Desktop\Following abusive email letter .exe' MD5: 368A0EC11590E137B1CD5405CD0591DB)
    • schtasks.exe (PID: 4084 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VUGIHQGciwlxDd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1045.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 3352 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "FTP", "FTP Info": "ftp://files.000webhost.com/zincocomputer147"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Following abusive email letter .exe.4183028.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Following abusive email letter .exe.4183028.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Process Start Without DLLShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\Following abusive email letter .exe' , ParentImage: C:\Users\user\Desktop\Following abusive email letter .exe, ParentProcessId: 3888, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 3352
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: 'C:\Users\user\Desktop\Following abusive email letter .exe' , ParentImage: C:\Users\user\Desktop\Following abusive email letter .exe, ParentProcessId: 3888, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 3352

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 4.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Info": "ftp://files.000webhost.com/zincocomputer147"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\VUGIHQGciwlxDd.exeReversingLabs: Detection: 39%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Following abusive email letter .exeVirustotal: Detection: 32%Perma Link
                      Source: Following abusive email letter .exeReversingLabs: Detection: 32%
                      Source: 4.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 4.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: Following abusive email letter .exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: Following abusive email letter .exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: OpenExistingResult.pdb source: Following abusive email letter .exe
                      Source: Binary string: OpenExistingResult.pdbH source: Following abusive email letter .exe
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.3:49741 -> 145.14.145.177:21
                      Source: TrafficSnort IDS: 2029928 ET TROJAN AgentTesla HTML System Info Report Exfil via FTP 192.168.2.3:49742 -> 145.14.145.177:30339
                      Source: global trafficTCP traffic: 192.168.2.3:49742 -> 145.14.145.177:30339
                      Source: Joe Sandbox ViewIP Address: 145.14.145.177 145.14.145.177
                      Source: Joe Sandbox ViewASN Name: AWEXUS AWEXUS
                      Source: unknownFTP traffic detected: 145.14.145.177:21 -> 192.168.2.3:49741 220 ProFTPD Server (000webhost.com) [::ffff:145.14.145.177]
                      Source: unknownDNS traffic detected: queries for: files.000webhost.com
                      Source: RegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpString found in binary or memory: ftp://files.000webhost.com/zincocomputer147STORLengthWriteCloseGetBytesOpera
                      Source: RegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpString found in binary or memory: http://CqZTYA.com
                      Source: RegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: RegSvcs.exe, 00000004.00000002.468629357.000000000308F000.00000004.00000001.sdmpString found in binary or memory: http://JC95xwwqEnXy3nGe.net
                      Source: RegSvcs.exe, 00000004.00000002.468629357.000000000308F000.00000004.00000001.sdmpString found in binary or memory: http://JC95xwwqEnXy3nGe.netL
                      Source: RegSvcs.exe, 00000004.00000002.469009805.0000000003111000.00000004.00000001.sdmpString found in binary or memory: http://files.000webhost.com
                      Source: Following abusive email letter .exe, 00000000.00000002.211148958.00000000030C1000.00000004.00000001.sdmp, RegSvcs.exe, 00000004.00000002.468959194.0000000003103000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: RegSvcs.exe, 00000004.00000002.469009805.0000000003111000.00000004.00000001.sdmpString found in binary or memory: http://us-east-1.route-1000.000webhost.awex.io
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: Following abusive email letter .exe, 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, RegSvcs.exe, 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 4.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bF52F2392u002d8C75u002d4729u002dA1E6u002d025BFAA162F9u007d/CB8ACA7Au002d9CEBu002d462Du002dA49Bu002dF669480A59B6.csLarge array initialization: .cctor: array initializer size 11932
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_00A7264C
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_016C9AA8
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_016CC750
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_016C9948
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_02E132F0
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_02E106E0
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_02E106D0
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_02E10B70
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_02E10B5F
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A3EED0
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A3F650
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A31D28
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A35D31
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A31D38
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A33519
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A35D40
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A31480
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A34468
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A3AC70
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A34458
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A3A7F0
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A32720
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A32730
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A31769
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A31778
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A39F50
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A356E0
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A356D2
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A33610
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A32189
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A32198
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A3C198
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A30920
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A30930
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A39948
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A358E8
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A358D8
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A35039
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A36805
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A36808
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A32040
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A35048
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A35B38
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A35B48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BA0820
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BAE018
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BA8D70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BA3FC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BA0CB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BA94C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BA2C08
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BAD9E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BA8B50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB00E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BBA870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB2920
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB7AB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB6678
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB6BF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BBEF30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB0720
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB2D38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BB87A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BCB060
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC2D50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BCDEC6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC1FF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BCA720
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC2768
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC9DB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_010B47A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_010B479F
                      Source: Following abusive email letter .exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: VUGIHQGciwlxDd.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Following abusive email letter .exe, 00000000.00000002.215243237.000000000C230000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Following abusive email letter .exe
                      Source: Following abusive email letter .exe, 00000000.00000002.215243237.000000000C230000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Following abusive email letter .exe
                      Source: Following abusive email letter .exe, 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKygo.dll* vs Following abusive email letter .exe
                      Source: Following abusive email letter .exe, 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTGqXBSLBNqFAlVDcDrdeyUgg.exe4 vs Following abusive email letter .exe
                      Source: Following abusive email letter .exe, 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs Following abusive email letter .exe
                      Source: Following abusive email letter .exe, 00000000.00000002.214907946.000000000C130000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Following abusive email letter .exe
                      Source: Following abusive email letter .exe, 00000000.00000000.199906618.0000000000B50000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameOpenExistingResult.exe< vs Following abusive email letter .exe
                      Source: Following abusive email letter .exeBinary or memory string: OriginalFilenameOpenExistingResult.exe< vs Following abusive email letter .exe
                      Source: Following abusive email letter .exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: Following abusive email letter .exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: VUGIHQGciwlxDd.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Following abusive email letter .exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: Following abusive email letter .exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: VUGIHQGciwlxDd.exe.0.dr, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: VUGIHQGciwlxDd.exe.0.dr, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
                      Source: 4.0.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 4.0.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@2/1
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeFile created: C:\Users\user\AppData\Roaming\VUGIHQGciwlxDd.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4884:120:WilError_01
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeFile created: C:\Users\user\AppData\Local\Temp\tmp1045.tmpJump to behavior
                      Source: Following abusive email letter .exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: Following abusive email letter .exeVirustotal: Detection: 32%
                      Source: Following abusive email letter .exeReversingLabs: Detection: 32%
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeFile read: C:\Users\user\Desktop\Following abusive email letter .exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Following abusive email letter .exe 'C:\Users\user\Desktop\Following abusive email letter .exe'
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VUGIHQGciwlxDd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1045.tmp'
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VUGIHQGciwlxDd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1045.tmp'
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Following abusive email letter .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Following abusive email letter .exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Following abusive email letter .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: OpenExistingResult.pdb source: Following abusive email letter .exe
                      Source: Binary string: OpenExistingResult.pdbH source: Following abusive email letter .exe

                      Data Obfuscation:

                      barindex
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: Following abusive email letter .exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: VUGIHQGciwlxDd.exe.0.dr, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.cs.Net Code: stackVariable5.GetMethod("GetDelegateForFunctionPointer", V_0)
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_00A75DCB pushfd ; retf
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_016CE8F0 pushfd ; ret
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_02E132F0 push 840617CBh; retf
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A36DE6 push esi; ret
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeCode function: 0_2_05A37790 push esp; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BCC4E0 pushfd ; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC2768 pushfd ; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC7A37 push edi; retn 0000h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC1E58 pushfd ; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BC2B78 pushfd ; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_010B451C push ss; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85847754402
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85847754402
                      Source: Following abusive email letter .exe, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'SUpqes', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: VUGIHQGciwlxDd.exe.0.dr, vJiGl01UUJfXfNWas3/DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: '.cctor', 'SUpqes', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeFile created: C:\Users\user\AppData\Roaming\VUGIHQGciwlxDd.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VUGIHQGciwlxDd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1045.tmp'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Following abusive email letter .exe PID: 3888, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3521
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6262
                      Source: C:\Users\user\Desktop\Following abusive email letter .exe TID: 6040Thread sleep time: -101485s >= -30000s
                      Source: C:\Users\user\Desktop\Following abusive email letter .exe TID: 2396Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeThread delayed: delay time: 101485
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: RegSvcs.exe, 00000004.00000002.472242636.0000000005EA0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: RegSvcs.exe, 00000004.00000002.472242636.0000000005EA0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: RegSvcs.exe, 00000004.00000002.472242636.0000000005EA0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Following abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: RegSvcs.exe, 00000004.00000002.472641648.0000000005FBA000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: RegSvcs.exe, 00000004.00000002.472242636.0000000005EA0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00BAE018 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VUGIHQGciwlxDd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1045.tmp'
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: RegSvcs.exe, 00000004.00000002.466731473.0000000001860000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: RegSvcs.exe, 00000004.00000002.466731473.0000000001860000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 00000004.00000002.466731473.0000000001860000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 00000004.00000002.466731473.0000000001860000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeQueries volume information: C:\Users\user\Desktop\Following abusive email letter .exe VolumeInformation
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Following abusive email letter .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.468629357.000000000308F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3352, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Following abusive email letter .exe PID: 3888, type: MEMORY
                      Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3352, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.468629357.000000000308F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3352, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Following abusive email letter .exe PID: 3888, type: MEMORY
                      Source: Yara matchFile source: 4.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Following abusive email letter .exe.4183028.2.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection12Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Alternative Protocol1Encrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information3Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSSecurity Software Discovery321Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion141Cached Domain CredentialsVirtualization/Sandbox Evasion141VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection12DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Following abusive email letter .exe32%VirustotalBrowse
                      Following abusive email letter .exe33%ReversingLabsByteCode-MSIL.Trojan.Heracles

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\VUGIHQGciwlxDd.exe39%ReversingLabsByteCode-MSIL.Trojan.Heracles

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      4.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      us-east-1.route-1000.000webhost.awex.io1%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://CqZTYA.com0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://JC95xwwqEnXy3nGe.net0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://JC95xwwqEnXy3nGe.netL0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://us-east-1.route-1000.000webhost.awex.io0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us-east-1.route-1000.000webhost.awex.io
                      145.14.145.177
                      truetrueunknown
                      files.000webhost.com
                      unknown
                      unknownfalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://CqZTYA.comRegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://JC95xwwqEnXy3nGe.netRegSvcs.exe, 00000004.00000002.468629357.000000000308F000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://DynDns.comDynDNSRegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://JC95xwwqEnXy3nGe.netLRegSvcs.exe, 00000004.00000002.468629357.000000000308F000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://files.000webhost.comRegSvcs.exe, 00000004.00000002.469009805.0000000003111000.00000004.00000001.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFollowing abusive email letter .exe, 00000000.00000002.211148958.00000000030C1000.00000004.00000001.sdmp, RegSvcs.exe, 00000004.00000002.468959194.0000000003103000.00000004.00000001.sdmpfalse
                            high
                            http://us-east-1.route-1000.000webhost.awex.ioRegSvcs.exe, 00000004.00000002.469009805.0000000003111000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipFollowing abusive email letter .exe, 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, RegSvcs.exe, 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            ftp://files.000webhost.com/zincocomputer147STORLengthWriteCloseGetBytesOperaRegSvcs.exe, 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmpfalse
                              high
                              https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssFollowing abusive email letter .exe, 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmpfalse
                                high

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                145.14.145.177
                                us-east-1.route-1000.000webhost.awex.ioNetherlands
                                204915AWEXUStrue

                                General Information

                                Joe Sandbox Version:32.0.0 Black Diamond
                                Analysis ID:433262
                                Start date:11.06.2021
                                Start time:14:57:20
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 8m 15s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:Following abusive email letter .exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:24
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@6/4@2/1
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 1% (good quality ratio 0.6%)
                                • Quality average: 44.9%
                                • Quality standard deviation: 42.2%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 168.61.161.212, 52.147.198.201, 20.50.102.62, 184.30.20.56, 20.54.26.129, 2.20.142.210, 2.20.142.209, 92.122.213.247, 92.122.213.194, 20.82.210.154
                                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                14:58:09API Interceptor1x Sleep call for process: Following abusive email letter .exe modified
                                14:58:20API Interceptor759x Sleep call for process: RegSvcs.exe modified

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                145.14.145.177Scan copy of said documents.exeGet hashmaliciousBrowse
                                  Additional documents.exeGet hashmaliciousBrowse
                                    Enclosed the following documents as requested.exeGet hashmaliciousBrowse
                                      Complaint Lodged Against Your Company .exeGet hashmaliciousBrowse
                                        DOCUMENTS.exeGet hashmaliciousBrowse
                                          documents and Details.exeGet hashmaliciousBrowse
                                            oLHQIQAI3N.exeGet hashmaliciousBrowse
                                              oLHQIQAI3N.exeGet hashmaliciousBrowse
                                                hoTA52pXM4.docGet hashmaliciousBrowse
                                                  hoTA52pXM4.docGet hashmaliciousBrowse

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    us-east-1.route-1000.000webhost.awex.ioAll Details.exeGet hashmaliciousBrowse
                                                    • 145.14.144.54
                                                    All the Documents and Details.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Additional documents required.pdf.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Kabyria El Arab-14326587.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Kabyria El Arab-14326587.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    FedEx Receipt with Reference Code.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    Abusive email letter from your account.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.145.177
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.144.149
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    Additional documents.exeGet hashmaliciousBrowse
                                                    • 145.14.145.177
                                                    Additional documents.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Complaint lodged against your company..exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Enclosed the following documents as requested.exeGet hashmaliciousBrowse
                                                    • 145.14.145.177
                                                    Complaint Lodged Against Your Company .exeGet hashmaliciousBrowse
                                                    • 145.14.145.177
                                                    All details.exeGet hashmaliciousBrowse
                                                    • 145.14.144.54
                                                    All details.exeGet hashmaliciousBrowse
                                                    • 145.14.144.54
                                                    Urgent Attention Required.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    DOCUMENTS.exeGet hashmaliciousBrowse
                                                    • 145.14.145.177

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    AWEXUSWcHO1ZGiIn.exeGet hashmaliciousBrowse
                                                    • 145.14.145.185
                                                    All Details.exeGet hashmaliciousBrowse
                                                    • 145.14.144.54
                                                    All the Documents and Details.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    PURCHASE ORDER.exeGet hashmaliciousBrowse
                                                    • 145.14.144.45
                                                    01_extracted.exeGet hashmaliciousBrowse
                                                    • 145.14.144.111
                                                    Additional documents required.pdf.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Kabyria El Arab-14326587.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    Kabyria El Arab-14326587.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    FedEx Receipt with Reference Code.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    OyVPRUTe0s.exeGet hashmaliciousBrowse
                                                    • 145.14.144.197
                                                    hfrEZuBd5B.exeGet hashmaliciousBrowse
                                                    • 145.14.144.156
                                                    1Z4191ecDy.exeGet hashmaliciousBrowse
                                                    • 145.14.144.12
                                                    j6RwLGBzlz.exeGet hashmaliciousBrowse
                                                    • 145.14.144.66
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209
                                                    A018379D343600DAB5B728E46D2EE4E12D3853837FCF1.exeGet hashmaliciousBrowse
                                                    • 145.14.144.210
                                                    Abusive email letter from your account.exeGet hashmaliciousBrowse
                                                    • 145.14.145.180
                                                    sample products 1,2,&,4.exeGet hashmaliciousBrowse
                                                    • 145.14.144.32
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.145.177
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.144.149
                                                    Scan copy of said documents.exeGet hashmaliciousBrowse
                                                    • 145.14.144.209

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Following abusive email letter .exe.log
                                                    Process:C:\Users\user\Desktop\Following abusive email letter .exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):1314
                                                    Entropy (8bit):5.350128552078965
                                                    Encrypted:false
                                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                    C:\Users\user\AppData\Local\Temp\tmp1045.tmp
                                                    Process:C:\Users\user\Desktop\Following abusive email letter .exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1647
                                                    Entropy (8bit):5.199714843668102
                                                    Encrypted:false
                                                    SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBvPLtn:cbh47TlNQ//rydbz9I3YODOLNdq3lPJ
                                                    MD5:DCC43E257CB9BECF598E74F756FEF25E
                                                    SHA1:D67330DB63650FCC9E8CA22EB86EC36CADCBA9B4
                                                    SHA-256:25951389412CFCBAE77EDB8D3F93419A40BECA0DD71A0C56C76977CCBDF87B48
                                                    SHA-512:AD1F23F8DEE31B16537CE51871BAFF9E011A0D072E50262BEA812B0AE2A5F5E82BA362907981D09738F689BDED856066F0FDD3B09D0DE8AE06F459DCA22E4D5E
                                                    Malicious:true
                                                    Reputation:low
                                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                    C:\Users\user\AppData\Roaming\VUGIHQGciwlxDd.exe
                                                    Process:C:\Users\user\Desktop\Following abusive email letter .exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):953856
                                                    Entropy (8bit):7.511931897413592
                                                    Encrypted:false
                                                    SSDEEP:12288:p12L4ovYmfBgM/npoaxFKgasrOe+Gcr1xs+j4JQ0DXUYNZM4e/ZUdtbV:pMpX3asL/EzsC4jLUgNeBUdtR
                                                    MD5:368A0EC11590E137B1CD5405CD0591DB
                                                    SHA1:48C11CB189D44AE0C30B32F0ABA41D4C52568C44
                                                    SHA-256:C0B43D27C73D2A64F25A1E095A10DCF339635D9C48C6D612B37EBA084341E103
                                                    SHA-512:57DBF150965546D99F1A076AF014E6B586323ED139DD4730D5A917174E159377F4AA97A674CCA65BBDA2B04C7A76454B9F0D6418E0A5F0ED5D90F9B4EDF62AC4
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 39%
                                                    Reputation:low
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`............................n.... ... ....@.. ....................... ............@................................. ...K....@............................................................................... ............... ..H............text...t.... ...................... ..`.sdata....... ......................@....rsrc........@......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Roaming\VUGIHQGciwlxDd.exe:Zone.Identifier
                                                    Process:C:\Users\user\Desktop\Following abusive email letter .exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):26
                                                    Entropy (8bit):3.95006375643621
                                                    Encrypted:false
                                                    SSDEEP:3:ggPYV:rPYV
                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview: [ZoneTransfer]....ZoneId=0

                                                    Static File Info

                                                    General

                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):7.511931897413592
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Windows Screen Saver (13104/52) 0.07%
                                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                    File name:Following abusive email letter .exe
                                                    File size:953856
                                                    MD5:368a0ec11590e137b1cd5405cd0591db
                                                    SHA1:48c11cb189d44ae0c30b32f0aba41d4c52568c44
                                                    SHA256:c0b43d27c73d2a64f25a1e095a10dcf339635d9c48c6d612b37eba084341e103
                                                    SHA512:57dbf150965546d99f1a076af014e6b586323ed139dd4730d5a917174e159377f4aa97a674cca65bbda2b04c7a76454b9f0d6418e0a5f0ed5d90f9b4edf62ac4
                                                    SSDEEP:12288:p12L4ovYmfBgM/npoaxFKgasrOe+Gcr1xs+j4JQ0DXUYNZM4e/ZUdtbV:pMpX3asL/EzsC4jLUgNeBUdtR
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`............................n.... ... ....@.. ....................... ............@................................

                                                    File Icon

                                                    Icon Hash:8c8caa8e9692aa00

                                                    Static PE Info

                                                    General

                                                    Entrypoint:0x4c006e
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                    Time Stamp:0x60C2968F [Thu Jun 10 22:47:43 2021 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:v4.0.30319
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                    Entrypoint Preview

                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al

                                                    Data Directories

                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc00200x4b.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x2a3a0.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xbffd20x1c.text
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text

                                                    Sections

                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000xbe0740xbe200False0.896723218688data7.85847754402IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                    .sdata0xc20000x1e80x200False0.861328125data6.63003510345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xc40000x2a3a00x2a400False0.124375924556data4.17209019153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xf00000xc0x200False0.041015625data0.0776331623432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                    Resources

                                                    NameRVASizeTypeLanguageCountry
                                                    RT_ICON0xc42b00x2326PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                    RT_ICON0xc65d80x10828dBase III DBT, version number 0, next free block index 40
                                                    RT_ICON0xd6e000x94a8data
                                                    RT_ICON0xe02a80x5488data
                                                    RT_ICON0xe57300x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                                    RT_ICON0xe99580x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                    RT_ICON0xebf000x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                    RT_ICON0xecfa80x988data
                                                    RT_ICON0xed9300x468GLS_BINARY_LSB_FIRST
                                                    RT_GROUP_ICON0xedd980x84data
                                                    RT_VERSION0xede1c0x398data
                                                    RT_MANIFEST0xee1b40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                    Imports

                                                    DLLImport
                                                    mscoree.dll_CorExeMain

                                                    Version Infos

                                                    DescriptionData
                                                    Translation0x0000 0x04b0
                                                    LegalCopyrightPaul Harris 2016
                                                    Assembly Version251.2.0.0
                                                    InternalNameOpenExistingResult.exe
                                                    FileVersion251.2.0.0
                                                    CompanyNamePaul Harris
                                                    LegalTrademarks
                                                    Comments1992 Alpine A 610
                                                    ProductNameReloadManager
                                                    ProductVersion251.2.0.0
                                                    FileDescriptionReloadManager
                                                    OriginalFilenameOpenExistingResult.exe

                                                    Network Behavior

                                                    Snort IDS Alerts

                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    06/11/21-14:59:47.080868TCP2029927ET TROJAN AgentTesla Exfil via FTP4974121192.168.2.3145.14.145.177
                                                    06/11/21-14:59:47.240610TCP2029928ET TROJAN AgentTesla HTML System Info Report Exfil via FTP4974230339192.168.2.3145.14.145.177

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jun 11, 2021 14:59:45.367415905 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:45.522007942 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:45.522905111 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:45.692617893 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:45.693629980 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:45.849685907 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.013902903 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.014364004 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:46.169060946 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.291543007 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.291822910 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:46.448378086 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.448662996 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.449168921 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:46.604037046 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.604501963 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:46.759372950 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.759576082 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:46.916337967 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:46.921998024 CEST4974230339192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:46.965778112 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:47.080533981 CEST3033949742145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:47.080650091 CEST4974230339192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:47.080868006 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:47.235999107 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:47.240609884 CEST4974230339192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:47.241487980 CEST4974230339192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:47.278336048 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:47.395955086 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:47.398730040 CEST3033949742145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:47.399564981 CEST3033949742145.14.145.177192.168.2.3
                                                    Jun 11, 2021 14:59:47.399647951 CEST4974230339192.168.2.3145.14.145.177
                                                    Jun 11, 2021 14:59:47.450216055 CEST4974121192.168.2.3145.14.145.177
                                                    Jun 11, 2021 15:00:17.597672939 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 15:00:17.597696066 CEST2149741145.14.145.177192.168.2.3
                                                    Jun 11, 2021 15:00:17.597767115 CEST4974121192.168.2.3145.14.145.177

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jun 11, 2021 14:58:00.848977089 CEST6493853192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:00.901431084 CEST53649388.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:02.214365005 CEST6015253192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:02.267451048 CEST53601528.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:03.133934975 CEST5754453192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:03.185378075 CEST53575448.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:04.132235050 CEST5598453192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:04.184144020 CEST53559848.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:05.016041040 CEST6418553192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:05.066240072 CEST53641858.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:05.958273888 CEST6511053192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:06.011267900 CEST53651108.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:06.785180092 CEST5836153192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:06.837188959 CEST53583618.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:07.865432024 CEST6349253192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:07.918978930 CEST53634928.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:08.933995008 CEST6083153192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:08.987077951 CEST53608318.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:12.021681070 CEST6010053192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:12.074774027 CEST53601008.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:13.068713903 CEST5319553192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:13.118885994 CEST53531958.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:14.029623032 CEST5014153192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:14.081605911 CEST53501418.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:15.311315060 CEST5302353192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:15.361881971 CEST53530238.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:16.216814041 CEST4956353192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:16.275664091 CEST53495638.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:17.166984081 CEST5135253192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:17.217223883 CEST53513528.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:18.081861973 CEST5934953192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:18.132059097 CEST53593498.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:18.975440025 CEST5708453192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:19.035496950 CEST53570848.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:19.826948881 CEST5882353192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:19.877147913 CEST53588238.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:20.745188951 CEST5756853192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:20.795350075 CEST53575688.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:36.149271965 CEST5054053192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:36.221723080 CEST53505408.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:38.182879925 CEST5436653192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:38.244031906 CEST53543668.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:54.642185926 CEST5303453192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:54.711458921 CEST53530348.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:56.481997967 CEST5776253192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:56.542021036 CEST53577628.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:58:56.645064116 CEST5543553192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:58:56.703546047 CEST53554358.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:59:13.063411951 CEST5071353192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:59:13.122354984 CEST53507138.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:59:19.376954079 CEST5613253192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:59:19.438102007 CEST53561328.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:59:45.185534000 CEST5898753192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:59:45.264453888 CEST53589878.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:59:45.279160976 CEST5657953192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:59:45.354423046 CEST53565798.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:59:48.451159000 CEST6063353192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:59:48.510210991 CEST53606338.8.8.8192.168.2.3
                                                    Jun 11, 2021 14:59:49.780607939 CEST6129253192.168.2.38.8.8.8
                                                    Jun 11, 2021 14:59:49.839562893 CEST53612928.8.8.8192.168.2.3

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Jun 11, 2021 14:59:45.185534000 CEST192.168.2.38.8.8.80x280Standard query (0)files.000webhost.comA (IP address)IN (0x0001)
                                                    Jun 11, 2021 14:59:45.279160976 CEST192.168.2.38.8.8.80xbefdStandard query (0)files.000webhost.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Jun 11, 2021 14:59:45.264453888 CEST8.8.8.8192.168.2.30x280No error (0)files.000webhost.comus-east-1.route-1000.000webhost.awex.ioCNAME (Canonical name)IN (0x0001)
                                                    Jun 11, 2021 14:59:45.264453888 CEST8.8.8.8192.168.2.30x280No error (0)us-east-1.route-1000.000webhost.awex.io145.14.145.177A (IP address)IN (0x0001)
                                                    Jun 11, 2021 14:59:45.354423046 CEST8.8.8.8192.168.2.30xbefdNo error (0)files.000webhost.comus-east-1.route-1000.000webhost.awex.ioCNAME (Canonical name)IN (0x0001)
                                                    Jun 11, 2021 14:59:45.354423046 CEST8.8.8.8192.168.2.30xbefdNo error (0)us-east-1.route-1000.000webhost.awex.io145.14.145.177A (IP address)IN (0x0001)

                                                    FTP Packets

                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Jun 11, 2021 14:59:45.692617893 CEST2149741145.14.145.177192.168.2.3220 ProFTPD Server (000webhost.com) [::ffff:145.14.145.177]
                                                    Jun 11, 2021 14:59:45.693629980 CEST4974121192.168.2.3145.14.145.177USER zinco
                                                    Jun 11, 2021 14:59:46.013902903 CEST2149741145.14.145.177192.168.2.3331 User zinco OK. Password required
                                                    Jun 11, 2021 14:59:46.014364004 CEST4974121192.168.2.3145.14.145.177PASS computer147
                                                    Jun 11, 2021 14:59:46.291543007 CEST2149741145.14.145.177192.168.2.3230-Your bandwidth usage is restricted
                                                    230-Your bandwidth usage is restricted230 OK. Current restricted directory is /
                                                    Jun 11, 2021 14:59:46.448662996 CEST2149741145.14.145.177192.168.2.3200 OK, UTF-8 enabled
                                                    Jun 11, 2021 14:59:46.449168921 CEST4974121192.168.2.3145.14.145.177PWD
                                                    Jun 11, 2021 14:59:46.604037046 CEST2149741145.14.145.177192.168.2.3257 "/" is your current location
                                                    Jun 11, 2021 14:59:46.604501963 CEST4974121192.168.2.3145.14.145.177TYPE I
                                                    Jun 11, 2021 14:59:46.759372950 CEST2149741145.14.145.177192.168.2.3200 TYPE is now 8-bit binary
                                                    Jun 11, 2021 14:59:46.759576082 CEST4974121192.168.2.3145.14.145.177PASV
                                                    Jun 11, 2021 14:59:46.916337967 CEST2149741145.14.145.177192.168.2.3227 Entering Passive Mode (145,14,145,177,118,131).
                                                    Jun 11, 2021 14:59:47.080868006 CEST4974121192.168.2.3145.14.145.177STOR PW_user-813848_2021_06_11_17_49_26.html
                                                    Jun 11, 2021 14:59:47.235999107 CEST2149741145.14.145.177192.168.2.3150 Connecting to port 34968
                                                    Jun 11, 2021 14:59:47.395955086 CEST2149741145.14.145.177192.168.2.3226-File successfully transferred
                                                    226-File successfully transferred226 0.160 seconds (measured here), 2.68 Kbytes per second
                                                    Jun 11, 2021 15:00:17.597672939 CEST2149741145.14.145.177192.168.2.3421 Idle timeout (30 seconds): closing control connection

                                                    Code Manipulations

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:14:58:08
                                                    Start date:11/06/2021
                                                    Path:C:\Users\user\Desktop\Following abusive email letter .exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Users\user\Desktop\Following abusive email letter .exe'
                                                    Imagebase:0xa70000
                                                    File size:953856 bytes
                                                    MD5 hash:368A0EC11590E137B1CD5405CD0591DB
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.211185227.00000000030FF000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.211544150.00000000040C9000.00000004.00000001.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    General

                                                    Start time:14:58:11
                                                    Start date:11/06/2021
                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\VUGIHQGciwlxDd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1045.tmp'
                                                    Imagebase:0x820000
                                                    File size:185856 bytes
                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:14:58:12
                                                    Start date:11/06/2021
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6b2800000
                                                    File size:625664 bytes
                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:14:58:12
                                                    Start date:11/06/2021
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Imagebase:0xa70000
                                                    File size:45152 bytes
                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.464217016.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.209849248.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.468629357.000000000308F000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.467290309.0000000002E61000.00000004.00000001.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >