Loading ...

Play interactive tourEdit tour

Windows Analysis Report S5ol5p3Ywd

Overview

General Information

Sample Name:S5ol5p3Ywd (renamed file extension from none to exe)
Analysis ID:452689
MD5:29e9ad8d44e49d2a2fa76ab14d6881cc
SHA1:bdc37994f00f36ce6c20261f395a25cb6f142267
SHA256:8bf2c9097f211f15879c233eacd3c5b6e767d768c5941765d986ab61ba877341
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Maps a DLL or memory area into another process
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • S5ol5p3Ywd.exe (PID: 5460 cmdline: 'C:\Users\user\Desktop\S5ol5p3Ywd.exe' MD5: 29E9AD8D44E49D2A2FA76AB14D6881CC)
    • MSBuild.exe (PID: 6116 cmdline: 'C:\Users\user\Desktop\S5ol5p3Ywd.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "vehicle@ccsp-india.com", "Password": "Lkp$CcsP1008", "Host": "smtp.ccsp-india.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 3 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.S5ol5p3Ywd.exe.2220000.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.S5ol5p3Ywd.exe.2220000.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.S5ol5p3Ywd.exe.2220000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.S5ol5p3Ywd.exe.2220000.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    1.2.MSBuild.exe.5a0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      Networking:

                      barindex
                      Sigma detected: MSBuild connects to smtp portShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 206.188.198.65, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 6116, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49749

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Antivirus / Scanner detection for submitted sampleShow sources
                      Source: S5ol5p3Ywd.exeAvira: detected
                      Found malware configurationShow sources
                      Source: 1.2.MSBuild.exe.5a0000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "vehicle@ccsp-india.com", "Password": "Lkp$CcsP1008", "Host": "smtp.ccsp-india.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: S5ol5p3Ywd.exeReversingLabs: Detection: 39%
                      Source: 0.2.S5ol5p3Ywd.exe.21a0000.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 0.2.S5ol5p3Ywd.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                      Source: 0.0.S5ol5p3Ywd.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                      Source: S5ol5p3Ywd.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                      Source: Binary string: wntdll.pdbUGP source: S5ol5p3Ywd.exe, 00000000.00000003.216900650.0000000002380000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: S5ol5p3Ywd.exe, 00000000.00000003.216900650.0000000002380000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49749 -> 206.188.198.65:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49751 -> 206.188.198.65:587
                      Source: global trafficTCP traffic: 192.168.2.3:49749 -> 206.188.198.65:587
                      Source: Joe Sandbox ViewIP Address: 206.188.198.65 206.188.198.65
                      Source: global trafficTCP traffic: 192.168.2.3:49749 -> 206.188.198.65:587
                      Source: unknownDNS traffic detected: queries for: smtp.ccsp-india.com
                      Source: MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000003.434135998.0000000000624000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.490731824.00000000029B4000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.490440599.0000000002951000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.490758061.00000000029BA000.00000004.00000001.sdmpString found in binary or memory: http://apVw5slr5VGGz7Jpi.com
                      Source: MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpString found in binary or memory: http://oUvOEM.com
                      Source: MSBuild.exe, 00000001.00000002.490857904.00000000029CA000.00000004.00000001.sdmpString found in binary or memory: http://smtp.ccsp-india.com
                      Source: MSBuild.exe, 00000001.00000002.490857904.00000000029CA000.00000004.00000001.sdmpString found in binary or memory: http://smtp.ccsp-india.com.netsolmail.net
                      Source: MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: S5ol5p3Ywd.exe, 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, MSBuild.exe, 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: S5ol5p3Ywd.exe, 00000000.00000002.226326104.00000000006CA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00876095
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00879990
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0087DA28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00879320
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00870B7F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00872E88
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00873614
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0087E848
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00882D50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0088E298
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00882618
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00881FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0088AB78
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0088BDE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00888FF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A6D690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A68C60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A69078
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A6B458
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A64B80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A69DE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A60145
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A652D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00A653C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00B43834
                      Source: S5ol5p3Ywd.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: S5ol5p3Ywd.exe, 00000000.00000003.217038339.0000000002496000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs S5ol5p3Ywd.exe
                      Source: S5ol5p3Ywd.exe, 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameeuBTclcChqenwdaokXVwrIozGFGzLmkrbZatUQ.exe4 vs S5ol5p3Ywd.exe
                      Source: S5ol5p3Ywd.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                      Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@3/1@4/1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\3cho0laf.hi3Jump to behavior
                      Source: S5ol5p3Ywd.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: S5ol5p3Ywd.exeReversingLabs: Detection: 39%
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeFile read: C:\Users\user\Desktop\S5ol5p3Ywd.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\S5ol5p3Ywd.exe 'C:\Users\user\Desktop\S5ol5p3Ywd.exe'
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\S5ol5p3Ywd.exe'
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\S5ol5p3Ywd.exe'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Binary string: wntdll.pdbUGP source: S5ol5p3Ywd.exe, 00000000.00000003.216900650.0000000002380000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: S5ol5p3Ywd.exe, 00000000.00000003.216900650.0000000002380000.00000004.00000001.sdmp
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_00887E3F push edi; retn 0000h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 462
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 9398
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4552Thread sleep time: -19369081277395017s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4160Thread sleep count: 462 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4160Thread sleep count: 9398 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: MSBuild.exe, 00000001.00000002.493143036.0000000005670000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: MSBuild.exe, 00000001.00000002.493143036.0000000005670000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: MSBuild.exe, 00000001.00000002.493143036.0000000005670000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: MSBuild.exe, 00000001.00000002.493341884.0000000005783000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: MSBuild.exe, 00000001.00000002.493143036.0000000005670000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 1_2_0087DA28 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeCode function: 0_2_022106DA mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeCode function: 0_2_022108EE mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeCode function: 0_2_02210A1C mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeCode function: 0_2_0221099F mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeCode function: 0_2_022109DE mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 370008
                      Source: C:\Users\user\Desktop\S5ol5p3Ywd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\S5ol5p3Ywd.exe'
                      Source: MSBuild.exe, 00000001.00000002.487993738.0000000001030000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: MSBuild.exe, 00000001.00000002.487993738.0000000001030000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: MSBuild.exe, 00000001.00000002.487993738.0000000001030000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: MSBuild.exe, 00000001.00000002.487993738.0000000001030000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.5a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.5a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6116, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: S5ol5p3Ywd.exe PID: 5460, type: MEMORY
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6116, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.5a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.S5ol5p3Ywd.exe.2220000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.5a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6116, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: S5ol5p3Ywd.exe PID: 5460, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection212Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Input Capture1Security Software Discovery111Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Credentials in Registry1Process Discovery2SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelData from Local System2Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      S5ol5p3Ywd.exe39%ReversingLabsWin32.Trojan.Razy
                      S5ol5p3Ywd.exe100%AviraTR/Crypt.ZPACK.Gen

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      1.2.MSBuild.exe.5a0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                      0.2.S5ol5p3Ywd.exe.21a0000.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      0.2.S5ol5p3Ywd.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                      0.0.S5ol5p3Ywd.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://smtp.ccsp-india.com0%Avira URL Cloudsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe
                      http://apVw5slr5VGGz7Jpi.com0%Avira URL Cloudsafe
                      http://oUvOEM.com0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      smtp.ccsp-india.com.netsolmail.net
                      206.188.198.65
                      truefalse
                        high
                        smtp.ccsp-india.com
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://api.ipify.org%GETMozilla/5.0MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          http://DynDns.comDynDNSMSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://smtp.ccsp-india.com.netsolmail.netMSBuild.exe, 00000001.00000002.490857904.00000000029CA000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipS5ol5p3Ywd.exe, 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, MSBuild.exe, 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://smtp.ccsp-india.comMSBuild.exe, 00000001.00000002.490857904.00000000029CA000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ipify.org%$MSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://apVw5slr5VGGz7Jpi.comMSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000003.434135998.0000000000624000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.490731824.00000000029B4000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.490440599.0000000002951000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.490758061.00000000029BA000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://oUvOEM.comMSBuild.exe, 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            206.188.198.65
                            smtp.ccsp-india.com.netsolmail.netUnited States
                            55002DEFENSE-NETUSfalse

                            General Information

                            Joe Sandbox Version:33.0.0 White Diamond
                            Analysis ID:452689
                            Start date:22.07.2021
                            Start time:18:07:46
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 7m 50s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:S5ol5p3Ywd (renamed file extension from none to exe)
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:26
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.spre.troj.spyw.evad.winEXE@3/1@4/1
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 2.9% (good quality ratio 2.9%)
                            • Quality average: 100%
                            • Quality standard deviation: 0%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                            • Excluded IPs from analysis (whitelisted): 52.147.198.201, 92.122.145.220, 13.88.21.125, 168.61.161.212, 52.255.188.83, 23.35.236.56, 20.49.157.6, 13.107.4.50, 51.103.5.186, 20.54.110.249, 40.112.88.60, 2.18.213.56, 2.18.213.74, 20.82.210.154
                            • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, Edge-Prod-FRAr4b.env.au.au-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, elasticShed.au.au-msedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, c-0001.c-msedge.net, afdap.au.au-msedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, au.au-msedge.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, au.c-0001.c-msedge.net, skypedataprdcolwus15.cloudapp.net, vip2-par02p.wns.notify.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: /opt/package/joesandbox/database/analysis/452689/sample/S5ol5p3Ywd.exe

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            18:08:58API Interceptor795x Sleep call for process: MSBuild.exe modified

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            206.188.198.65G5w887WZky.exeGet hashmaliciousBrowse
                              PO-New. Order.xlsxGet hashmaliciousBrowse
                                RsnCVdx1DM.exeGet hashmaliciousBrowse
                                  ULGRf4qKGg.exeGet hashmaliciousBrowse
                                    Vfe3epIAsF.exeGet hashmaliciousBrowse
                                      vbc.exeGet hashmaliciousBrowse
                                        PO-HUATON SO- CERAMIC VASE.xlsxGet hashmaliciousBrowse
                                          .exeGet hashmaliciousBrowse

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            smtp.ccsp-india.com.netsolmail.netG5w887WZky.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            PO-New. Order.xlsxGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            RsnCVdx1DM.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            ULGRf4qKGg.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            Vfe3epIAsF.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            vbc.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            PO-HUATON SO- CERAMIC VASE.xlsxGet hashmaliciousBrowse
                                            • 206.188.198.65

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            DEFENSE-NETUSTNT Shipment.exeGet hashmaliciousBrowse
                                            • 205.178.189.129
                                            MhE9fqMkDW.exeGet hashmaliciousBrowse
                                            • 206.188.197.227
                                            G5w887WZky.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            PO-New. Order.xlsxGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            RsnCVdx1DM.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            ULGRf4qKGg.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            Vfe3epIAsF.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            vbc.exeGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            PO-HUATON SO- CERAMIC VASE.xlsxGet hashmaliciousBrowse
                                            • 206.188.198.65
                                            owen.exeGet hashmaliciousBrowse
                                            • 205.178.189.131
                                            x5vhRkJPYg.exeGet hashmaliciousBrowse
                                            • 206.188.196.176
                                            S5.exeGet hashmaliciousBrowse
                                            • 205.178.146.249
                                            krJF4BtzSv.exeGet hashmaliciousBrowse
                                            • 205.178.189.131
                                            8a6H4PCj7U.xlsGet hashmaliciousBrowse
                                            • 206.188.193.150
                                            PO 2420208.exeGet hashmaliciousBrowse
                                            • 205.178.146.249
                                            SecuriteInfo.com.Trojan.Hosts.48193.14884.exeGet hashmaliciousBrowse
                                            • 205.178.146.235
                                            http://dregol.comGet hashmaliciousBrowse
                                            • 107.162.173.146
                                            http://tracking.mynetglobe.com/view?msgid=QLykQQgnO8vsE7HiT7Bwow2Get hashmaliciousBrowse
                                            • 205.178.187.43
                                            baf6b9fcec491619b45c1dd7db56ad3d.exeGet hashmaliciousBrowse
                                            • 206.188.193.6
                                            https://rebrand.ly/we9znGet hashmaliciousBrowse
                                            • 107.162.137.162

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\Roaming\3cho0laf.hi3\Chrome\Default\Cookies
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):0.6970840431455908
                                            Encrypted:false
                                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                            MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                            SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                            SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                            SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.423524571065457
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:S5ol5p3Ywd.exe
                                            File size:396842
                                            MD5:29e9ad8d44e49d2a2fa76ab14d6881cc
                                            SHA1:bdc37994f00f36ce6c20261f395a25cb6f142267
                                            SHA256:8bf2c9097f211f15879c233eacd3c5b6e767d768c5941765d986ab61ba877341
                                            SHA512:3efc9b48804a7d978fd00385c5adf4135f3f699507ac6e3621e9eaf3cdbe75973c34f67778baca5ab31d3133ca782ba0b44c222bcba5b2249361901d4e18cbb6
                                            SSDEEP:6144:kUdGmTN22PVgsSvSe5BGdHjhk6tvQBWsx9kVa11v2yAUl64mUulBbcUXZVpB3T:JT742tkoQZTp2yLnulmy7pB3T
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-.t.Lb'.Lb'.Lb'.4.'.Lb'.Lc'.Lb'.4.'.Lb'.4.'.Lb'.4.'.Lb'Rich.Lb'........PE..L....W.`.....................................0....@

                                            File Icon

                                            Icon Hash:f0f2f8f8e0f9b0e0

                                            Static PE Info

                                            General

                                            Entrypoint:0x401000
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x60F95795 [Thu Jul 22 11:33:41 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:0
                                            File Version Major:5
                                            File Version Minor:0
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:0
                                            Import Hash:63b0867460dd31e465a337a5e3e003e6

                                            Entrypoint Preview

                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            sub esp, 00000670h
                                            mov byte ptr [ebp-00000288h], FFFFFFE9h
                                            mov byte ptr [ebp-00000287h], FFFFFF90h
                                            mov byte ptr [ebp-00000286h], 00000000h
                                            mov byte ptr [ebp-00000285h], 00000000h
                                            mov byte ptr [ebp-00000284h], 00000000h
                                            mov byte ptr [ebp-00000283h], 00000055h
                                            mov byte ptr [ebp-00000282h], FFFFFF8Bh
                                            mov byte ptr [ebp-00000281h], FFFFFFECh
                                            mov byte ptr [ebp-00000280h], 00000056h
                                            mov byte ptr [ebp-0000027Fh], FFFFFF8Bh
                                            mov byte ptr [ebp-0000027Eh], 00000075h
                                            mov byte ptr [ebp-0000027Dh], 00000008h
                                            mov byte ptr [ebp-0000027Ch], FFFFFFBAh
                                            mov byte ptr [ebp-0000027Bh], 0000001Bh
                                            mov byte ptr [ebp-0000027Ah], 0000000Eh
                                            mov byte ptr [ebp-00000279h], 00000000h
                                            mov byte ptr [ebp-00000278h], 00000000h
                                            mov byte ptr [ebp-00000277h], 00000057h
                                            mov byte ptr [ebp-00000276h], FFFFFFEBh
                                            mov byte ptr [ebp-00000275h], 0000000Eh
                                            mov byte ptr [ebp-00000274h], FFFFFF8Bh
                                            mov byte ptr [ebp-00000273h], FFFFFFCAh
                                            mov byte ptr [ebp-00000272h], FFFFFFD1h
                                            mov byte ptr [ebp-00000271h], FFFFFFE8h
                                            mov byte ptr [ebp-00000270h], FFFFFFC1h
                                            mov byte ptr [ebp-0000026Fh], FFFFFFE1h
                                            mov byte ptr [ebp-0000026Eh], 00000007h
                                            mov byte ptr [ebp+00000000h], 00000000h

                                            Rich Headers

                                            Programming Language:
                                            • [ C ] VS2008 SP1 build 30729
                                            • [IMP] VS2008 SP1 build 30729
                                            • [LNK] VS2008 SP1 build 30729

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x30700x78.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x27a28.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x30000x70.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x10d80x1200False0.474175347222data4.70070274292IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rdata0x30000x2340x400False0.3125data2.64202346139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .rsrc0x40000x27a280x27c00False0.481156643082data6.11102695818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0x42680x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                            RT_ICON0x14a900x94a8dataEnglishUnited States
                                            RT_ICON0x1df380x5488dataEnglishUnited States
                                            RT_ICON0x233c00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 248, next used block 520093696EnglishUnited States
                                            RT_ICON0x275e80x25a8dataEnglishUnited States
                                            RT_ICON0x29b900x10a8dataEnglishUnited States
                                            RT_ICON0x2ac380x988dataEnglishUnited States
                                            RT_ICON0x2b5c00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                            RT_GROUP_ICON0x41f00x76dataEnglishUnited States

                                            Imports

                                            DLLImport
                                            USER32.dllGetDC, GrayStringA
                                            OLEAUT32.dllVarCyFromI4, VARIANT_UserSize, DispGetIDsOfNames, VariantChangeTypeEx, VarI4FromI1, SafeArrayGetElement, VarDecFromUI1, VarR8FromI4, VarDiv
                                            WINSPOOL.DRVConnectToPrinterDlg, AddPortW, DeleteFormW, EnumPrintProcessorDatatypesA
                                            dbghelp.dllMakeSureDirectoryPathExists, SymGetLineFromAddr64
                                            WS2_32.dllWSAAsyncGetProtoByNumber, htons, WSACleanup, getprotobynumber, ntohs

                                            Possible Origin

                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States

                                            Network Behavior

                                            Snort IDS Alerts

                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            07/22/21-18:10:30.312323TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49749587192.168.2.3206.188.198.65
                                            07/22/21-18:10:34.539225TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49751587192.168.2.3206.188.198.65

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 22, 2021 18:10:29.092978001 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:29.238730907 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:29.238892078 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:29.393724918 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:29.395386934 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:29.541147947 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:29.541187048 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:29.542845011 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:29.688291073 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:29.688854933 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:29.865175009 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:29.868025064 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:30.013956070 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:30.015482903 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:30.163815022 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:30.164330959 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:30.310708046 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:30.312323093 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:30.312355042 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:30.312824011 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:30.312891960 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:30.457878113 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:30.458400011 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:30.587764025 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:30.636301994 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:31.954263926 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:32.100791931 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:32.100963116 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:32.101042032 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:32.101541996 CEST49749587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:32.247302055 CEST58749749206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:33.311096907 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:33.459732056 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:33.460920095 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:33.615350008 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:33.619690895 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:33.768762112 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:33.768794060 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:33.769200087 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:33.917810917 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:33.918951988 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.088537931 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.089003086 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.237868071 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.238291025 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.387082100 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.388519049 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.537503004 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.538984060 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.539225101 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.539334059 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.539433002 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.539581060 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.539701939 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.539777994 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.539856911 CEST49751587192.168.2.3206.188.198.65
                                            Jul 22, 2021 18:10:34.689202070 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.689455032 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.689471006 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.815499067 CEST58749751206.188.198.65192.168.2.3
                                            Jul 22, 2021 18:10:34.871160984 CEST49751587192.168.2.3206.188.198.65

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 22, 2021 18:08:33.390384912 CEST6493853192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:33.442338943 CEST53649388.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:34.168965101 CEST6015253192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:34.231354952 CEST53601528.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:34.985819101 CEST5754453192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:35.035039902 CEST53575448.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:36.186767101 CEST5598453192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:36.250977039 CEST53559848.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:36.326626062 CEST6418553192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:36.378582954 CEST53641858.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:37.670350075 CEST6511053192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:37.727324963 CEST53651108.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:39.012231112 CEST5836153192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:39.066178083 CEST53583618.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:40.288574934 CEST6349253192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:40.345947981 CEST53634928.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:41.234500885 CEST6083153192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:41.291266918 CEST53608318.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:42.142219067 CEST6010053192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:42.199259043 CEST53601008.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:42.965595007 CEST5319553192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:43.014672041 CEST53531958.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:43.924236059 CEST5014153192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:43.973972082 CEST53501418.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:45.204530954 CEST5302353192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:45.256814957 CEST53530238.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:46.253062010 CEST4956353192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:46.305377960 CEST53495638.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:47.062294960 CEST5135253192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:47.114308119 CEST53513528.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:48.188538074 CEST5934953192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:48.248224974 CEST53593498.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:49.041968107 CEST5708453192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:49.101777077 CEST53570848.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:50.011109114 CEST5882353192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:50.063071012 CEST53588238.8.8.8192.168.2.3
                                            Jul 22, 2021 18:08:51.513200045 CEST5756853192.168.2.38.8.8.8
                                            Jul 22, 2021 18:08:51.572911024 CEST53575688.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:03.645977020 CEST5054053192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:03.716909885 CEST53505408.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:09.055929899 CEST5436653192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:09.113380909 CEST53543668.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:27.080077887 CEST5303453192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:27.139035940 CEST53530348.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:28.436912060 CEST5776253192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:28.487279892 CEST53577628.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:29.961843014 CEST5543553192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:30.069127083 CEST53554358.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:30.925252914 CEST5071353192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:30.983562946 CEST53507138.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:31.320944071 CEST5613253192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:31.403682947 CEST53561328.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:31.408488035 CEST5898753192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:31.457633972 CEST53589878.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:31.634721041 CEST5657953192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:31.716274977 CEST53565798.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:32.367038012 CEST6063353192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:32.428637028 CEST53606338.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:33.409073114 CEST6129253192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:33.469281912 CEST53612928.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:34.069996119 CEST6361953192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:34.133254051 CEST53636198.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:35.556178093 CEST6493853192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:35.616170883 CEST53649388.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:36.704319000 CEST6194653192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:36.761745930 CEST53619468.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:37.633666992 CEST6491053192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:37.691725016 CEST53649108.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:38.021142006 CEST5212353192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:38.078427076 CEST53521238.8.8.8192.168.2.3
                                            Jul 22, 2021 18:09:38.575212002 CEST5613053192.168.2.38.8.8.8
                                            Jul 22, 2021 18:09:38.636823893 CEST53561308.8.8.8192.168.2.3
                                            Jul 22, 2021 18:10:28.632456064 CEST5633853192.168.2.38.8.8.8
                                            Jul 22, 2021 18:10:28.915991068 CEST53563388.8.8.8192.168.2.3
                                            Jul 22, 2021 18:10:28.939475060 CEST5942053192.168.2.38.8.8.8
                                            Jul 22, 2021 18:10:29.001329899 CEST53594208.8.8.8192.168.2.3
                                            Jul 22, 2021 18:10:31.750498056 CEST5878453192.168.2.38.8.8.8
                                            Jul 22, 2021 18:10:31.816099882 CEST53587848.8.8.8192.168.2.3
                                            Jul 22, 2021 18:10:32.675518990 CEST6397853192.168.2.38.8.8.8
                                            Jul 22, 2021 18:10:32.949801922 CEST53639788.8.8.8192.168.2.3
                                            Jul 22, 2021 18:10:33.249434948 CEST6293853192.168.2.38.8.8.8
                                            Jul 22, 2021 18:10:33.309463978 CEST53629388.8.8.8192.168.2.3

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Jul 22, 2021 18:10:28.632456064 CEST192.168.2.38.8.8.80x95baStandard query (0)smtp.ccsp-india.comA (IP address)IN (0x0001)
                                            Jul 22, 2021 18:10:28.939475060 CEST192.168.2.38.8.8.80xd8eaStandard query (0)smtp.ccsp-india.comA (IP address)IN (0x0001)
                                            Jul 22, 2021 18:10:32.675518990 CEST192.168.2.38.8.8.80xa64Standard query (0)smtp.ccsp-india.comA (IP address)IN (0x0001)
                                            Jul 22, 2021 18:10:33.249434948 CEST192.168.2.38.8.8.80x5ef2Standard query (0)smtp.ccsp-india.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Jul 22, 2021 18:10:28.915991068 CEST8.8.8.8192.168.2.30x95baNo error (0)smtp.ccsp-india.comsmtp.ccsp-india.com.netsolmail.netCNAME (Canonical name)IN (0x0001)
                                            Jul 22, 2021 18:10:28.915991068 CEST8.8.8.8192.168.2.30x95baNo error (0)smtp.ccsp-india.com.netsolmail.net206.188.198.65A (IP address)IN (0x0001)
                                            Jul 22, 2021 18:10:29.001329899 CEST8.8.8.8192.168.2.30xd8eaNo error (0)smtp.ccsp-india.comsmtp.ccsp-india.com.netsolmail.netCNAME (Canonical name)IN (0x0001)
                                            Jul 22, 2021 18:10:29.001329899 CEST8.8.8.8192.168.2.30xd8eaNo error (0)smtp.ccsp-india.com.netsolmail.net206.188.198.65A (IP address)IN (0x0001)
                                            Jul 22, 2021 18:10:32.949801922 CEST8.8.8.8192.168.2.30xa64No error (0)smtp.ccsp-india.comsmtp.ccsp-india.com.netsolmail.netCNAME (Canonical name)IN (0x0001)
                                            Jul 22, 2021 18:10:32.949801922 CEST8.8.8.8192.168.2.30xa64No error (0)smtp.ccsp-india.com.netsolmail.net206.188.198.65A (IP address)IN (0x0001)
                                            Jul 22, 2021 18:10:33.309463978 CEST8.8.8.8192.168.2.30x5ef2No error (0)smtp.ccsp-india.comsmtp.ccsp-india.com.netsolmail.netCNAME (Canonical name)IN (0x0001)
                                            Jul 22, 2021 18:10:33.309463978 CEST8.8.8.8192.168.2.30x5ef2No error (0)smtp.ccsp-india.com.netsolmail.net206.188.198.65A (IP address)IN (0x0001)

                                            SMTP Packets

                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Jul 22, 2021 18:10:29.393724918 CEST58749749206.188.198.65192.168.2.3220 mailpod.hostingplatform.com ESMTP
                                            Jul 22, 2021 18:10:29.395386934 CEST49749587192.168.2.3206.188.198.65EHLO 284992
                                            Jul 22, 2021 18:10:29.541187048 CEST58749749206.188.198.65192.168.2.3250-mailpod.hostingplatform.com
                                            250-STARTTLS
                                            250-PIPELINING
                                            250-8BITMIME
                                            250-SIZE 65000000
                                            250 AUTH LOGIN PLAIN CRAM-MD5
                                            Jul 22, 2021 18:10:29.542845011 CEST49749587192.168.2.3206.188.198.65AUTH login dmVoaWNsZUBjY3NwLWluZGlhLmNvbQ==
                                            Jul 22, 2021 18:10:29.688291073 CEST58749749206.188.198.65192.168.2.3334 UGFzc3dvcmQ6
                                            Jul 22, 2021 18:10:29.865175009 CEST58749749206.188.198.65192.168.2.3235 ok, go ahead (#2.0.0)
                                            Jul 22, 2021 18:10:29.868025064 CEST49749587192.168.2.3206.188.198.65MAIL FROM:<vehicle@ccsp-india.com>
                                            Jul 22, 2021 18:10:30.013956070 CEST58749749206.188.198.65192.168.2.3250 ok
                                            Jul 22, 2021 18:10:30.015482903 CEST49749587192.168.2.3206.188.198.65RCPT TO:<text@dividekings.com>
                                            Jul 22, 2021 18:10:30.163815022 CEST58749749206.188.198.65192.168.2.3250 ok
                                            Jul 22, 2021 18:10:30.164330959 CEST49749587192.168.2.3206.188.198.65DATA
                                            Jul 22, 2021 18:10:30.310708046 CEST58749749206.188.198.65192.168.2.3354 go ahead
                                            Jul 22, 2021 18:10:30.312891960 CEST49749587192.168.2.3206.188.198.65.
                                            Jul 22, 2021 18:10:30.587764025 CEST58749749206.188.198.65192.168.2.3250 ok 1626970230 qp 40355
                                            Jul 22, 2021 18:10:31.954263926 CEST49749587192.168.2.3206.188.198.65QUIT
                                            Jul 22, 2021 18:10:32.100791931 CEST58749749206.188.198.65192.168.2.3221 mailpod.hostingplatform.com
                                            Jul 22, 2021 18:10:33.615350008 CEST58749751206.188.198.65192.168.2.3220 mailpod.hostingplatform.com ESMTP
                                            Jul 22, 2021 18:10:33.619690895 CEST49751587192.168.2.3206.188.198.65EHLO 284992
                                            Jul 22, 2021 18:10:33.768794060 CEST58749751206.188.198.65192.168.2.3250-mailpod.hostingplatform.com
                                            250-STARTTLS
                                            250-PIPELINING
                                            250-8BITMIME
                                            250-SIZE 65000000
                                            250 AUTH LOGIN PLAIN CRAM-MD5
                                            Jul 22, 2021 18:10:33.769200087 CEST49751587192.168.2.3206.188.198.65AUTH login dmVoaWNsZUBjY3NwLWluZGlhLmNvbQ==
                                            Jul 22, 2021 18:10:33.917810917 CEST58749751206.188.198.65192.168.2.3334 UGFzc3dvcmQ6
                                            Jul 22, 2021 18:10:34.088537931 CEST58749751206.188.198.65192.168.2.3235 ok, go ahead (#2.0.0)
                                            Jul 22, 2021 18:10:34.089003086 CEST49751587192.168.2.3206.188.198.65MAIL FROM:<vehicle@ccsp-india.com>
                                            Jul 22, 2021 18:10:34.237868071 CEST58749751206.188.198.65192.168.2.3250 ok
                                            Jul 22, 2021 18:10:34.238291025 CEST49751587192.168.2.3206.188.198.65RCPT TO:<text@dividekings.com>
                                            Jul 22, 2021 18:10:34.387082100 CEST58749751206.188.198.65192.168.2.3250 ok
                                            Jul 22, 2021 18:10:34.388519049 CEST49751587192.168.2.3206.188.198.65DATA
                                            Jul 22, 2021 18:10:34.537503004 CEST58749751206.188.198.65192.168.2.3354 go ahead
                                            Jul 22, 2021 18:10:34.539856911 CEST49751587192.168.2.3206.188.198.65.
                                            Jul 22, 2021 18:10:34.815499067 CEST58749751206.188.198.65192.168.2.3250 ok 1626970234 qp 40596

                                            Code Manipulations

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:18:08:40
                                            Start date:22/07/2021
                                            Path:C:\Users\user\Desktop\S5ol5p3Ywd.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\S5ol5p3Ywd.exe'
                                            Imagebase:0x400000
                                            File size:396842 bytes
                                            MD5 hash:29E9AD8D44E49D2A2FA76AB14D6881CC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.226441045.0000000002220000.00000040.00000001.sdmp, Author: Joe Security
                                            Reputation:low

                                            General

                                            Start time:18:08:40
                                            Start date:22/07/2021
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\S5ol5p3Ywd.exe'
                                            Imagebase:0x1a0000
                                            File size:261728 bytes
                                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.488248576.0000000002641000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.484489566.00000000005A2000.00000040.00000001.sdmp, Author: Joe Security
                                            Reputation:moderate

                                            Disassembly

                                            Code Analysis

                                            Reset < >