Loading ...

Play interactive tourEdit tour

Windows Analysis Report Documentos de env#U00edo.exe

Overview

General Information

Sample Name:Documentos de env#U00edo.exe
Analysis ID:457991
MD5:a60166d50572eedc2e44b327e4928324
SHA1:0b5c5afd46ab950959dc1e5fda5520ddae0c51a4
SHA256:8a714868cf6bea9d1a01154cc98fa33abbe75350f06cf26d31538ed0aba6a808
Tags:exe
Infos:

Most interesting Screenshot:

Detection

GuLoader AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

GuLoader behavior detected
Multi AV Scanner detection for submitted file
Sigma detected: RegAsm connects to smtp port
Yara detected AgentTesla
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Executable has a suspicious name (potential lure to open the executable)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to retrieve information about pressed keystrokes
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • Documentos de env#U00edo.exe (PID: 5448 cmdline: 'C:\Users\user\Desktop\Documentos de env#U00edo.exe' MD5: A60166D50572EEDC2E44B327E4928324)
    • RegAsm.exe (PID: 5088 cmdline: 'C:\Users\user\Desktop\Documentos de env#U00edo.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 5024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: RegAsm.exe PID: 5088JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      Process Memory Space: RegAsm.exe PID: 5088JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

        Sigma Overview

        Networking:

        barindex
        Sigma detected: RegAsm connects to smtp portShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 78.128.8.31, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, Initiated: true, ProcessId: 5088, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49754

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: Documentos de env#U00edo.exeVirustotal: Detection: 20%Perma Link
        Source: Documentos de env#U00edo.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: unknownHTTPS traffic detected: 216.58.208.174:443 -> 192.168.2.3:49746 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 216.58.208.129:443 -> 192.168.2.3:49747 version: TLS 1.2

        Networking:

        barindex
        Source: global trafficTCP traffic: 192.168.2.3:49754 -> 78.128.8.31:587
        Source: Joe Sandbox ViewIP Address: 78.128.8.31 78.128.8.31
        Source: Joe Sandbox ViewASN Name: TELEPOINTBG TELEPOINTBG
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: global trafficTCP traffic: 192.168.2.3:49754 -> 78.128.8.31:587
        Source: unknownDNS traffic detected: queries for: drive.google.com
        Source: RegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
        Source: RegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
        Source: RegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1289517050.000000001DD50000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000003.862518902.00000000012F1000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1289680896.000000001DDC6000.00000004.00000001.sdmpString found in binary or memory: http://SFk55itrh2ylIByRGIl.net
        Source: RegAsm.exe, 00000014.00000003.894284187.0000000000E9A000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
        Source: RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpString found in binary or memory: http://brimaq.com
        Source: RegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpString found in binary or memory: http://cWlbEv.com
        Source: RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
        Source: RegAsm.exe, 00000014.00000003.894284187.0000000000E9A000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
        Source: RegAsm.exe, 00000014.00000002.1283640842.000000000125F000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: RegAsm.exe, 00000014.00000003.894284187.0000000000E9A000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
        Source: RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
        Source: RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
        Source: RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpString found in binary or memory: http://mail.brimaq.com
        Source: RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
        Source: RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
        Source: RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
        Source: RegAsm.exe, 00000014.00000002.1283558110.0000000001240000.00000004.00000020.sdmpString found in binary or memory: http://pki.goog/gsrr
        Source: RegAsm.exe, 00000014.00000002.1282624893.0000000000E63000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.l
        Source: RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0#
        Source: RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
        Source: RegAsm.exe, 00000014.00000002.1283789594.00000000012A4000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: RegAsm.exe, 00000014.00000002.1283789594.00000000012A4000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: RegAsm.exe, 00000014.00000002.1282624893.0000000000E63000.00000004.00000001.sdmpString found in binary or memory: http://x1.kx
        Source: RegAsm.exe, 00000014.00000002.1283558110.0000000001240000.00000004.00000020.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/
        Source: RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpString found in binary or memory: https://doc-10-00-docs.googleusercontent.com/)
        Source: RegAsm.exe, 00000014.00000002.1283558110.0000000001240000.00000004.00000020.sdmpString found in binary or memory: https://doc-10-00-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/q5t04a04
        Source: RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpString found in binary or memory: https://doc-10-00-docs.googleusercontent.com/g
        Source: RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/
        Source: RegAsm.exe, 00000014.00000002.1282413879.0000000000BC0000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1u3UtP2e9N-KtyQTSuDKByxsCSqIoJWVk
        Source: RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1u3UtP2e9N-KtyQTSuDKByxsCSqIoJWVknc
        Source: RegAsm.exe, 00000014.00000002.1282413879.0000000000BC0000.00000004.00000001.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1u3UtP2e9N-KtyQTSuDKByxsCSqIoJWVkwininet.dllMozilla/5
        Source: RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpString found in binary or memory: https://pki.goog/repository/0
        Source: RegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
        Source: unknownHTTPS traffic detected: 216.58.208.174:443 -> 192.168.2.3:49746 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 216.58.208.129:443 -> 192.168.2.3:49747 version: TLS 1.2
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_004028B4 GetAsyncKeyState,
        Source: Documentos de env#U00edo.exe, 00000000.00000002.580708415.000000000072A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        System Summary:

        barindex
        Executable has a suspicious name (potential lure to open the executable)Show sources
        Source: Documentos de env#U00edo.exeStatic file information: Suspicious name
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: Documentos de env#U00edo.exe
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess Stats: CPU usage > 98%
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 98%
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CD2B8E8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CD25660
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CD26D80
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDB2D50
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDB2618
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDB1FE0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDBDF68
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDBAB70
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDBC320
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDBEE88
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDBF7C8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDF6C84
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDF0040
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDFFA40
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDF3620
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDFC220
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDF9368
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1D8B47A0
        Source: Documentos de env#U00edo.exe, 00000000.00000002.580697666.0000000000710000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Documentos de env#U00edo.exe
        Source: Documentos de env#U00edo.exe, 00000000.00000000.203569731.0000000000423000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamePROSODETICDEF.exe vs Documentos de env#U00edo.exe
        Source: Documentos de env#U00edo.exeBinary or memory string: OriginalFilenamePROSODETICDEF.exe vs Documentos de env#U00edo.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
        Source: Documentos de env#U00edo.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@4/1@4/3
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5024:120:WilError_01
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeFile created: C:\Users\user\AppData\Local\Temp\~DFB9F937056F61369A.TMPJump to behavior
        Source: Documentos de env#U00edo.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeFile read: C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1002\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: Documentos de env#U00edo.exeVirustotal: Detection: 20%
        Source: unknownProcess created: C:\Users\user\Desktop\Documentos de env#U00edo.exe 'C:\Users\user\Desktop\Documentos de env#U00edo.exe'
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Documentos de env#U00edo.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Documentos de env#U00edo.exe'
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4a04656d-52aa-49de-8a09-cb178760e748}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00409055 push ss; ret
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_0040B45D push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_004090A4 push ss; ret
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00406151 push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00407566 push edi; ret
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00408D20 push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00409184 push ss; ret
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00407E4C push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_0040B657 push ebp; ret
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_0040BE67 push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00409A90 push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_0040BEAF push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_00409B6A push ss; iretd
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeCode function: 0_2_022573AB push es; retf
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_00F0B424 push edx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDB0027 push eax; retf
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDB7A37 push edi; retn 0000h
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1D8BB9A1 pushfd ; retf
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1D8BBB6F pushfd ; retf
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 000000000225916B second address: 000000000225916B instructions:
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 000000000225AD54 second address: 000000000225AD54 instructions:
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 00000000022571FE second address: 00000000022571FE instructions:
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 000000000225441C second address: 000000000225441C instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F03CA3 second address: 0000000000F03CA3 instructions:
        Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Tries to detect Any.runShow sources
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: RegAsm.exe, 00000014.00000002.1282413879.0000000000BC0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=HTTPS://DRIVE.GOOGLE.COM/UC?EXPORT=DOWNLOAD&ID=1U3UTP2E9N-KTYQTSUDKBYXSCSQIOJWVKWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
        Source: Documentos de env#U00edo.exe, 00000000.00000002.581799628.0000000003C90000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1282413879.0000000000BC0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Source: Documentos de env#U00edo.exe, 00000000.00000002.580732268.000000000075E000.00000004.00000020.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE}[@W
        Source: Documentos de env#U00edo.exe, 00000000.00000002.580732268.000000000075E000.00000004.00000020.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Source: Documentos de env#U00edo.exe, 00000000.00000002.581799628.0000000003C90000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32USERPROFILE=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\REGASM.EXE\SYSWOW64\MSVBVM60.DLL
        Tries to detect virtualization through RDTSC time measurementsShow sources
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 000000000225916B second address: 000000000225916B instructions:
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 000000000225AD54 second address: 000000000225AD54 instructions:
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 000000000225621F second address: 000000000225621F instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, FA25E20Bh 0x00000013 xor eax, 8D2E0BD9h 0x00000018 xor eax, B706CE67h 0x0000001d add eax, 3FF2D84Ch 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FB080D17B53h 0x0000002e popad 0x0000002f call 00007FB080D1489Ch 0x00000034 lfence 0x00000037 rdtsc
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 00000000022571FE second address: 00000000022571FE instructions:
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 000000000225441C second address: 000000000225441C instructions:
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeRDTSC instruction interceptor: First address: 0000000002254C41 second address: 0000000002254CD8 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 add ebx, E4F5C3BBh 0x00000009 xor ebx, F04BE065h 0x0000000f push ebx 0x00000010 mov ebx, dword ptr [ebp+00000269h] 0x00000016 mov dword ptr [ebp+0000027Dh], edi 0x0000001c mov edi, 6EA3B468h 0x00000021 cmp edx, eax 0x00000023 cmp ecx, ecx 0x00000025 xor edi, CF0FEDB9h 0x0000002b xor edi, 3ACEA381h 0x00000031 xor edi, 9B62FA50h 0x00000037 jmp 00007FB080A5394Ah 0x00000039 pushad 0x0000003a mov esi, 0000005Fh 0x0000003f rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F0621F second address: 0000000000F0621F instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, FA25E20Bh 0x00000013 xor eax, 8D2E0BD9h 0x00000018 xor eax, B706CE67h 0x0000001d add eax, 3FF2D84Ch 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007FB080D17B53h 0x0000002e popad 0x0000002f call 00007FB080D1489Ch 0x00000034 lfence 0x00000037 rdtsc
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000F03CA3 second address: 0000000000F03CA3 instructions:
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 367
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9469
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5032Thread sleep time: -15679732462653109s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: RegAsm.exe, 00000014.00000002.1282413879.0000000000BC0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=https://drive.google.com/uc?export=download&id=1u3UtP2e9N-KtyQTSuDKByxsCSqIoJWVkwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        Source: Documentos de env#U00edo.exe, 00000000.00000002.580732268.000000000075E000.00000004.00000020.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe}[@W
        Source: Documentos de env#U00edo.exe, 00000000.00000002.581799628.0000000003C90000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32USERPROFILE=windir=\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe\syswow64\msvbvm60.dll
        Source: RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
        Source: Documentos de env#U00edo.exe, 00000000.00000002.581799628.0000000003C90000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1282413879.0000000000BC0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: RegAsm.exe, 00000014.00000002.1283558110.0000000001240000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW}
        Source: Documentos de env#U00edo.exe, 00000000.00000002.580732268.000000000075E000.00000004.00000020.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeSystem information queried: ModuleInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 20_2_1CDF0040 LdrInitializeThunk,
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F00000
        Source: C:\Users\user\Desktop\Documentos de env#U00edo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\Documentos de env#U00edo.exe'
        Source: RegAsm.exe, 00000014.00000002.1284217440.0000000001800000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: RegAsm.exe, 00000014.00000002.1284217440.0000000001800000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegAsm.exe, 00000014.00000002.1284217440.0000000001800000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegAsm.exe, 00000014.00000002.1284217440.0000000001800000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        GuLoader behavior detectedShow sources
        Source: Initial fileSignature Results: GuLoader behavior
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5088, type: MEMORYSTR
        Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
        Tries to harvest and steal browser information (history, passwords, etc)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
        Tries to harvest and steal ftp login credentialsShow sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
        Tries to steal Mail credentials (via file access)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
        Source: Yara matchFile source: 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5088, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Yara detected AgentTeslaShow sources
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5088, type: MEMORYSTR

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Process Injection112Disable or Modify Tools1OS Credential Dumping2Security Software Discovery621Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion341Input Capture21Process Discovery2Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection112Credentials in Registry1Virtualization/Sandbox Evasion341SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelData from Local System2Scheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery315Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        Documentos de env#U00edo.exe21%VirustotalBrowse
        Documentos de env#U00edo.exe7%ReversingLabsWin32.Trojan.Mucc

        Dropped Files

        No Antivirus matches

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        brimaq.com0%VirustotalBrowse
        mail.brimaq.com1%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
        http://x1.kx0%Avira URL Cloudsafe
        http://DynDns.comDynDNS0%URL Reputationsafe
        http://cps.letsencrypt.org00%URL Reputationsafe
        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
        http://r3.i.l0%Avira URL Cloudsafe
        http://x1.c.lencr.org/00%URL Reputationsafe
        http://x1.i.lencr.org/00%URL Reputationsafe
        http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
        http://pki.goog/gsrr0%Avira URL Cloudsafe
        http://brimaq.com0%Avira URL Cloudsafe
        http://mail.brimaq.com0%Avira URL Cloudsafe
        http://r3.o.lencr.org00%URL Reputationsafe
        http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
        http://cWlbEv.com0%Avira URL Cloudsafe
        http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
        https://pki.goog/repository/00%URL Reputationsafe
        http://SFk55itrh2ylIByRGIl.net0%Avira URL Cloudsafe
        http://r3.i.lencr.org/0#0%URL Reputationsafe
        http://cps.root-x1.letsencrypt.org00%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        drive.google.com
        216.58.208.174
        truefalse
          high
          brimaq.com
          78.128.8.31
          truetrueunknown
          googlehosted.l.googleusercontent.com
          216.58.208.129
          truefalse
            high
            doc-10-00-docs.googleusercontent.com
            unknown
            unknownfalse
              high
              mail.brimaq.com
              unknown
              unknownfalseunknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://x1.kxRegAsm.exe, 00000014.00000002.1282624893.0000000000E63000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://DynDns.comDynDNSRegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://cps.letsencrypt.org0RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              https://doc-10-00-docs.googleusercontent.com/gRegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpfalse
                high
                https://drive.google.com/RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpfalse
                  high
                  http://r3.i.lRegAsm.exe, 00000014.00000002.1282624893.0000000000E63000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://x1.c.lencr.org/0RegAsm.exe, 00000014.00000002.1283789594.00000000012A4000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://x1.i.lencr.org/0RegAsm.exe, 00000014.00000002.1283789594.00000000012A4000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://doc-10-00-docs.googleusercontent.com/)RegAsm.exe, 00000014.00000002.1283473550.00000000011F8000.00000004.00000020.sdmpfalse
                    high
                    https://doc-10-00-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/q5t04a04RegAsm.exe, 00000014.00000002.1283558110.0000000001240000.00000004.00000020.sdmpfalse
                      high
                      http://crl.pki.goog/GTS1O1core.crl0RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://pki.goog/gsrrRegAsm.exe, 00000014.00000002.1283558110.0000000001240000.00000004.00000020.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://brimaq.comRegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://mail.brimaq.comRegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r3.o.lencr.org0RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://pki.goog/gsr2/GTS1O1.crt0RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://cWlbEv.comRegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.pki.goog/gsr2/gsr2.crl0?RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://pki.goog/repository/0RegAsm.exe, 00000014.00000002.1283704360.0000000001286000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://SFk55itrh2ylIByRGIl.netRegAsm.exe, 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1289517050.000000001DD50000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000003.862518902.00000000012F1000.00000004.00000001.sdmp, RegAsm.exe, 00000014.00000002.1289680896.000000001DDC6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r3.i.lencr.org/0#RegAsm.exe, 00000014.00000002.1289609196.000000001DD94000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://cps.root-x1.letsencrypt.org0RegAsm.exe, 00000014.00000003.894284187.0000000000E9A000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      216.58.208.174
                      drive.google.comUnited States
                      15169GOOGLEUSfalse
                      216.58.208.129
                      googlehosted.l.googleusercontent.comUnited States
                      15169GOOGLEUSfalse
                      78.128.8.31
                      brimaq.comBulgaria
                      31083TELEPOINTBGtrue

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:457991
                      Start date:02.08.2021
                      Start time:16:56:12
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 13m 12s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:Documentos de env#U00edo.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Run name:Suspected Instruction Hammering Hide Perf
                      Number of analysed new started processes analysed:42
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.spre.troj.spyw.evad.winEXE@4/1@4/3
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 5.5% (good quality ratio 1.8%)
                      • Quality average: 18.7%
                      • Quality standard deviation: 30.6%
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .exe
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, taskhostw.exe, RuntimeBroker.exe, backgroundTaskHost.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, MusNotifyIcon.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                      • TCP Packets have been reduced to 100
                      • Excluded IPs from analysis (whitelisted): 40.88.32.150, 13.64.90.137, 20.82.209.183, 23.211.4.86, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.82.210.154, 20.54.110.249, 20.190.160.136, 20.190.160.2, 20.190.160.8, 20.190.160.6, 20.190.160.132, 20.190.160.75, 20.190.160.73, 20.190.160.4, 93.184.220.29, 20.49.150.241, 51.104.136.2, 40.127.240.158
                      • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, www.tm.lg.prod.aadmsa.akadns.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, ocsp.digicert.com, login.live.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, settings-win.data.microsoft.com, www.tm.a.prd.aadg.akadns.net, login.msa.msidentity.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      17:00:47API Interceptor2043x Sleep call for process: RegAsm.exe modified

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      78.128.8.31Zapytanie ofertowe-ETG4791.exeGet hashmaliciousBrowse
                        AWB-18267638920511_Pl.exeGet hashmaliciousBrowse
                          PO0621.exeGet hashmaliciousBrowse
                            AWB-182676389205111_ES.exeGet hashmaliciousBrowse
                              RFxOFFER 373721.exeGet hashmaliciousBrowse
                                RFxOFFER 373721.exeGet hashmaliciousBrowse
                                  #CMA-CMG.exeGet hashmaliciousBrowse
                                    #CMA-CMB.exeGet hashmaliciousBrowse
                                      FACTURA 6475.exeGet hashmaliciousBrowse
                                        AWB-18267638920511_ES.exeGet hashmaliciousBrowse
                                          FACTURA 6476.exeGet hashmaliciousBrowse
                                            Zam#U00f3wienie-290421.85655463.exeGet hashmaliciousBrowse
                                              PZnr10961754.exeGet hashmaliciousBrowse
                                                Nieprawid#U0142owy IBAN.exeGet hashmaliciousBrowse
                                                  AWB-182676389205111_ES.exeGet hashmaliciousBrowse
                                                    xVvAobZvWU.exeGet hashmaliciousBrowse
                                                      FAKTURA I RACHUNKI.exeGet hashmaliciousBrowse

                                                        Domains

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                                        ASN

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        TELEPOINTBGVfNmYKR1b7Get hashmaliciousBrowse
                                                        • 78.142.32.102
                                                        Zapytanie ofertowe-ETG4791.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        AWB-18267638920511_Pl.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        PO0621.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        xwKdahKPn8.exeGet hashmaliciousBrowse
                                                        • 79.124.76.247
                                                        N0vpYgIYpv.exeGet hashmaliciousBrowse
                                                        • 79.124.76.20
                                                        dqVPlpmWYt.exeGet hashmaliciousBrowse
                                                        • 78.142.47.220
                                                        Receipt_Dhl_000010000000000000000010.pdf.exeGet hashmaliciousBrowse
                                                        • 78.142.47.93
                                                        00010200390_0192021.pdf.exeGet hashmaliciousBrowse
                                                        • 78.142.47.93
                                                        AWB-182676389205111_ES.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        RFxOFFER 373721.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        RFxOFFER 373721.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        New_Order.exeGet hashmaliciousBrowse
                                                        • 91.148.168.141
                                                        #CMA-CMG.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        #CMA-CMB.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        FACTURA 6475.exeGet hashmaliciousBrowse
                                                        • 78.128.8.31
                                                        generated order 677120.xlsmGet hashmaliciousBrowse
                                                        • 217.174.152.36
                                                        generated_check_9698936.xlsmGet hashmaliciousBrowse
                                                        • 217.174.152.52
                                                        purchase order 370149.xlsmGet hashmaliciousBrowse
                                                        • 217.174.152.36
                                                        copy of fax 04946.xlsmGet hashmaliciousBrowse
                                                        • 217.174.152.36

                                                        JA3 Fingerprints

                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        37f463bf4616ecd445d4a1937da06e19economic relations.docGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        dumpservice.vbsGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        Invoice-NBM01557.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        o12nY1xwUl.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        R4qgfTvaiK.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        Zaobz-rdbmw-xdw-f.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        AR2rPMLtaN.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        NEW PO pdf.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        BFE85B846350851DD4F83DFED498AE60F85D4129329C2.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        Aging invoice.htmlGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        R5L9IoaG67.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        flJrVwWebP.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        QfVER41Fwx.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        1A263B2603212FF1E492D9E0C718F12601789E27EAABA.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        mbVrdKm3zX.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        bHC6bZhkMz.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        5qW61eKDTp.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        WWzUml7m53.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        e7V79qGVJT.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174
                                                        it2TiN2UtR.exeGet hashmaliciousBrowse
                                                        • 216.58.208.129
                                                        • 216.58.208.174

                                                        Dropped Files

                                                        No context

                                                        Created / dropped Files

                                                        \Device\ConDrv
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):30
                                                        Entropy (8bit):3.964735178725505
                                                        Encrypted:false
                                                        SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                                        MD5:9F754B47B351EF0FC32527B541420595
                                                        SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                                        SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                                        SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview: NordVPN directory not found!..

                                                        Static File Info

                                                        General

                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.37444232902198
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.15%
                                                        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:Documentos de env#U00edo.exe
                                                        File size:143360
                                                        MD5:a60166d50572eedc2e44b327e4928324
                                                        SHA1:0b5c5afd46ab950959dc1e5fda5520ddae0c51a4
                                                        SHA256:8a714868cf6bea9d1a01154cc98fa33abbe75350f06cf26d31538ed0aba6a808
                                                        SHA512:b3ff28a846c6f0c7f7d54ea3c485be76b76f1d49b497ea79c145b4d2e0b53806d6a254e2b7e6931612fc688874ec85b03e7c50f405f638a18b94394ad111d81c
                                                        SSDEEP:3072:W5CFYJr2EF82w1+AG+TeMn5+oXdFv1x9:PHEbLEzhNFv
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...u.NY.....................0....................@................

                                                        File Icon

                                                        Icon Hash:c4e8c8cccce0e8e8

                                                        Static PE Info

                                                        General

                                                        Entrypoint:0x4014b4
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                        DLL Characteristics:
                                                        Time Stamp:0x594EF175 [Sat Jun 24 23:10:45 2017 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:fef384fc3a66a559dff455f07d497ca0

                                                        Entrypoint Preview

                                                        Instruction
                                                        push 00401EC0h
                                                        call 00007FB08076E3E3h
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        xor byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        inc eax
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add ah, ch
                                                        nop

                                                        Data Directories

                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x204d40x28.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000xc1c.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x10000x190.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                        Sections

                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x1facc0x20000False0.381553649902data6.66782218684IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                        .data0x210000x11bc0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x230000xc1c0x1000False0.313720703125data3.27540208335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                        Resources

                                                        NameRVASizeTypeLanguageCountry
                                                        RT_ICON0x233740x8a8data
                                                        RT_GROUP_ICON0x233600x14data
                                                        RT_VERSION0x230f00x270dataChineseTaiwan

                                                        Imports

                                                        DLLImport
                                                        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaVarForInit, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaR4Str, DllFunctionCall, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaR8Str, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

                                                        Version Infos

                                                        DescriptionData
                                                        Translation0x0404 0x04b0
                                                        InternalNamePROSODETICDEF
                                                        FileVersion1.00
                                                        CompanyNameIntersection Road
                                                        CommentsIntersection Road
                                                        ProductNameRONTGE
                                                        ProductVersion1.00
                                                        OriginalFilenamePROSODETICDEF.exe

                                                        Possible Origin

                                                        Language of compilation systemCountry where language is spokenMap
                                                        ChineseTaiwan

                                                        Network Behavior

                                                        Network Port Distribution

                                                        TCP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Aug 2, 2021 17:00:34.338813066 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.360301018 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:34.360454082 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.398952961 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.422363043 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:34.438225031 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:34.438266993 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:34.438297033 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:34.438332081 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:34.438374043 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.438457012 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.525110006 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.546905041 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:34.547039986 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.569781065 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:34.596438885 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:35.280466080 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:35.280524969 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:35.280565023 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:35.280608892 CEST44349746216.58.208.174192.168.2.3
                                                        Aug 2, 2021 17:00:35.280726910 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:35.280823946 CEST49746443192.168.2.3216.58.208.174
                                                        Aug 2, 2021 17:00:35.372680902 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.393856049 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.394048929 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.395579100 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.416757107 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.433420897 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.433475971 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.433569908 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.433595896 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.433605909 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.433725119 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.433731079 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.433747053 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.433845997 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.450187922 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.472893953 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.472994089 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.473820925 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.499691010 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.765315056 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.765347958 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.765367031 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.765388966 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.765412092 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.765450954 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.765525103 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.765532970 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.766763926 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.766793966 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.766855955 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.766880989 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.768345118 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.768367052 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.768423080 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.768450975 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.769890070 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.769920111 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.769964933 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.769984007 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.771447897 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.771473885 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.771557093 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.771579027 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.772995949 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.773022890 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.773088932 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.773114920 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.774578094 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.775125980 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.786448002 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.786480904 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.786536932 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.786581039 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.787178993 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.787215948 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.787267923 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.787298918 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.788737059 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.788764954 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.788822889 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.790267944 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.790292025 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.790357113 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.790383101 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.791872978 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.791899920 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.791950941 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.791974068 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.793534040 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.793560982 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.793615103 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.793641090 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.795005083 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.795037985 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.795109987 CEST49747443192.168.2.3216.58.208.129
                                                        Aug 2, 2021 17:00:35.796602964 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.796659946 CEST44349747216.58.208.129192.168.2.3
                                                        Aug 2, 2021 17:00:35.796688080 CEST49747443192.168.2.3216.58.208.129

                                                        UDP Packets

                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Aug 2, 2021 16:56:55.567585945 CEST6015253192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:56:55.592525005 CEST53601528.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:56:56.659517050 CEST5754453192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:56:56.687064886 CEST53575448.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:56:58.562406063 CEST5598453192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:56:58.596236944 CEST53559848.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:01.436415911 CEST6418553192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:01.462224007 CEST53641858.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:04.115099907 CEST6511053192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:04.140150070 CEST53651108.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:05.099077940 CEST5836153192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:05.139965057 CEST53583618.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:05.758502960 CEST6349253192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:05.784557104 CEST53634928.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:06.762748957 CEST6083153192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:06.795519114 CEST53608318.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:07.785878897 CEST6010053192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:07.811289072 CEST53601008.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:08.831943989 CEST5319553192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:08.866193056 CEST53531958.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:09.937596083 CEST5014153192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:09.965112925 CEST53501418.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:10.554968119 CEST5302353192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:10.582675934 CEST53530238.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:11.175050020 CEST4956353192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:11.202613115 CEST53495638.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:12.215919018 CEST5135253192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:12.243463039 CEST53513528.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:12.852411985 CEST5934953192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:12.878633976 CEST53593498.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:13.503043890 CEST5708453192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:13.528069019 CEST53570848.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:27.573021889 CEST5882353192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:27.616233110 CEST53588238.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:30.643105984 CEST5756853192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:30.680594921 CEST53575688.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:57:44.806967974 CEST5054053192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:57:44.860752106 CEST53505408.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:58:02.608850002 CEST5436653192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:58:02.649127007 CEST53543668.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:58:08.086823940 CEST5303453192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:58:08.121056080 CEST53530348.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:58:39.202707052 CEST5776253192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:58:39.246503115 CEST53577628.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:58:41.927797079 CEST5543553192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:58:41.971268892 CEST53554358.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:49.285362005 CEST5071353192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:49.363018036 CEST53507138.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:51.279289961 CEST5613253192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:51.318583012 CEST53561328.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:52.192172050 CEST5898753192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:52.224678993 CEST53589878.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:52.602555990 CEST5657953192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:52.635065079 CEST53565798.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:53.053513050 CEST6063353192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:53.087201118 CEST53606338.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:53.625606060 CEST6129253192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:53.659023046 CEST53612928.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:54.109380960 CEST6361953192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:54.144692898 CEST53636198.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:56.510467052 CEST6493853192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:56.543087959 CEST53649388.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:58.192559004 CEST6194653192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:58.225089073 CEST53619468.8.8.8192.168.2.3
                                                        Aug 2, 2021 16:59:58.567750931 CEST6491053192.168.2.38.8.8.8
                                                        Aug 2, 2021 16:59:58.592955112 CEST53649108.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:00:34.271162987 CEST5212353192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:00:34.312190056 CEST53521238.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:00:35.310036898 CEST5613053192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:00:35.367260933 CEST53561308.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:01:50.753842115 CEST5633853192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:01:50.789350033 CEST53563388.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:01:50.937465906 CEST5942053192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:01:50.971564054 CEST53594208.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:01:51.334006071 CEST5878453192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:01:51.374604940 CEST53587848.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:01:54.350487947 CEST6397853192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:01:54.390949965 CEST53639788.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:01:57.951273918 CEST6293853192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:01:57.997874022 CEST53629388.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:01:58.277338982 CEST5570853192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:01:58.320988894 CEST53557088.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:02:15.230190992 CEST5680353192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:02:15.293793917 CEST53568038.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:02:15.303226948 CEST5714553192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:02:15.368041992 CEST53571458.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:04:12.082567930 CEST5535953192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:04:12.131478071 CEST53553598.8.8.8192.168.2.3
                                                        Aug 2, 2021 17:04:46.497484922 CEST5830653192.168.2.38.8.8.8
                                                        Aug 2, 2021 17:04:46.538428068 CEST53583068.8.8.8192.168.2.3

                                                        DNS Queries

                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                        Aug 2, 2021 17:00:34.271162987 CEST192.168.2.38.8.8.80xd6e8Standard query (0)drive.google.comA (IP address)IN (0x0001)
                                                        Aug 2, 2021 17:00:35.310036898 CEST192.168.2.38.8.8.80xa4deStandard query (0)doc-10-00-docs.googleusercontent.comA (IP address)IN (0x0001)
                                                        Aug 2, 2021 17:02:15.230190992 CEST192.168.2.38.8.8.80x80deStandard query (0)mail.brimaq.comA (IP address)IN (0x0001)
                                                        Aug 2, 2021 17:02:15.303226948 CEST192.168.2.38.8.8.80xe5bbStandard query (0)mail.brimaq.comA (IP address)IN (0x0001)

                                                        DNS Answers

                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                        Aug 2, 2021 17:00:34.312190056 CEST8.8.8.8192.168.2.30xd6e8No error (0)drive.google.com216.58.208.174A (IP address)IN (0x0001)
                                                        Aug 2, 2021 17:00:35.367260933 CEST8.8.8.8192.168.2.30xa4deNo error (0)doc-10-00-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                                                        Aug 2, 2021 17:00:35.367260933 CEST8.8.8.8192.168.2.30xa4deNo error (0)googlehosted.l.googleusercontent.com216.58.208.129A (IP address)IN (0x0001)
                                                        Aug 2, 2021 17:01:50.789350033 CEST8.8.8.8192.168.2.30x9bacNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                        Aug 2, 2021 17:02:15.293793917 CEST8.8.8.8192.168.2.30x80deNo error (0)mail.brimaq.combrimaq.comCNAME (Canonical name)IN (0x0001)
                                                        Aug 2, 2021 17:02:15.293793917 CEST8.8.8.8192.168.2.30x80deNo error (0)brimaq.com78.128.8.31A (IP address)IN (0x0001)
                                                        Aug 2, 2021 17:02:15.368041992 CEST8.8.8.8192.168.2.30xe5bbNo error (0)mail.brimaq.combrimaq.comCNAME (Canonical name)IN (0x0001)
                                                        Aug 2, 2021 17:02:15.368041992 CEST8.8.8.8192.168.2.30xe5bbNo error (0)brimaq.com78.128.8.31A (IP address)IN (0x0001)

                                                        HTTPS Packets

                                                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                        Aug 2, 2021 17:00:34.438332081 CEST216.58.208.174443192.168.2.349746CN=*.google.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Mon Jun 28 03:38:45 CEST 2021 Thu Jun 15 02:00:42 CEST 2017Mon Sep 20 03:38:44 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                        CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021
                                                        Aug 2, 2021 17:00:35.433747053 CEST216.58.208.129443192.168.2.349747CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Mon Jun 28 05:06:51 CEST 2021 Thu Jun 15 02:00:42 CEST 2017Mon Sep 20 05:06:50 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                        CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021

                                                        SMTP Packets

                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                        Aug 2, 2021 17:02:15.702640057 CEST5874975478.128.8.31192.168.2.3220-srvr.laprimeracloud08.com ESMTP Exim 4.94.2 #2 Mon, 02 Aug 2021 17:02:16 +0200
                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                        220 and/or bulk e-mail.
                                                        Aug 2, 2021 17:02:15.703107119 CEST49754587192.168.2.378.128.8.31EHLO 347688
                                                        Aug 2, 2021 17:02:15.756469011 CEST5874975478.128.8.31192.168.2.3250-srvr.laprimeracloud08.com Hello 347688 [84.17.52.25]
                                                        250-SIZE 52428800
                                                        250-8BITMIME
                                                        250-PIPELINING
                                                        250-PIPE_CONNECT
                                                        250-AUTH PLAIN LOGIN
                                                        250-STARTTLS
                                                        250 HELP
                                                        Aug 2, 2021 17:02:15.757208109 CEST49754587192.168.2.378.128.8.31STARTTLS
                                                        Aug 2, 2021 17:02:15.813966990 CEST5874975478.128.8.31192.168.2.3220 TLS go ahead

                                                        Code Manipulations

                                                        Statistics

                                                        Behavior

                                                        Click to jump to process

                                                        System Behavior

                                                        General

                                                        Start time:16:57:01
                                                        Start date:02/08/2021
                                                        Path:C:\Users\user\Desktop\Documentos de env#U00edo.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\Documentos de env#U00edo.exe'
                                                        Imagebase:0x400000
                                                        File size:143360 bytes
                                                        MD5 hash:A60166D50572EEDC2E44B327E4928324
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Visual Basic
                                                        Reputation:low

                                                        General

                                                        Start time:16:58:51
                                                        Start date:02/08/2021
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\Documentos de env#U00edo.exe'
                                                        Imagebase:0xa70000
                                                        File size:64616 bytes
                                                        MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000014.00000002.1289141287.000000001DA41000.00000004.00000001.sdmp, Author: Joe Security
                                                        Reputation:high

                                                        General

                                                        Start time:16:58:51
                                                        Start date:02/08/2021
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6b2800000
                                                        File size:625664 bytes
                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high

                                                        Disassembly

                                                        Code Analysis

                                                        Reset < >