Loading ...

Play interactive tourEdit tour

Windows Analysis Report Inv 0110617985 PO Wartsila quantiparts B.V..exe

Overview

General Information

Sample Name:Inv 0110617985 PO Wartsila quantiparts B.V..exe
Analysis ID:458946
MD5:5c9c7f90ae087c40601f5d6bd85cadb7
SHA1:15a76b5c5d5ee677f33b76a8371054821c6f6522
SHA256:2e4901e09f9e7e72b65f301113d5bb075576e02fee03eb8414a986a1cca63cbb
Tags:exenull
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates processes with suspicious names
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "samy@cairoshippinginternational.com", "Password": "NermoSamy@2006+", "Host": "mail.cairoshippinginternational.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Inv 0110617985 PO Wartsila quantiparts B.V..exe PID: 4472JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 1 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "samy@cairoshippinginternational.com", "Password": "NermoSamy@2006+", "Host": "mail.cairoshippinginternational.com"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeVirustotal: Detection: 71%Perma Link
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeMetadefender: Detection: 40%Perma Link
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeReversingLabs: Detection: 85%
                Machine Learning detection for sampleShow sources
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeJoe Sandbox ML: detected
                Source: 6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49756 -> 99.198.101.234:587
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpString found in binary or memory: http://kgXKqA.com
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpString found in binary or memory: https://2ldxNK2U0Dyorw0.org
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWindow created: window name: CLIPBRDWNDCLASS
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_013755A0
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_0137B864
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_01373378
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_01370EA8
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_0137B468
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_0137C7F8
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_01372E38
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_015709C8
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_017BD160
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_017B8B18
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_017B1F88
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_017B538C
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_017B8649
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_031D47A0
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_031D5471
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_031D3CCC
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_031D4710
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_031D46B0
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_031D46D0
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_031DD661
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000001.00000000.216013415.0000000000E14000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameITypeLibImporterNotifySi.exe4 vs Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameXVLIKsxArMXXshQXbZxL.exe4 vs Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.491090167.00000000063E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.484976552.000000000158A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.483740101.0000000000F34000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameITypeLibImporterNotifySi.exe4 vs Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485371021.0000000001790000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeBinary or memory string: OriginalFilenameITypeLibImporterNotifySi.exe4 vs Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/0
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Inv 0110617985 PO Wartsila quantiparts B.V..exe.logJump to behavior
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeMutant created: \Sessions\1\BaseNamedObjects\flBuYYWkaCCoZhEJXJlsLfIks
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeVirustotal: Detection: 71%
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeMetadefender: Detection: 40%
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeReversingLabs: Detection: 85%
                Source: unknownProcess created: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe 'C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe'
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess created: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess created: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic file information: File size 1315328 > 1048576
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x110600
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: initial sampleStatic PE information: section name: .text entropy: 7.71885600168
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile created: \inv 0110617985 po wartsila quantiparts b.v..exe
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile created: \inv 0110617985 po wartsila quantiparts b.v..exe
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWindow / User API: threadDelayed 2225
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWindow / User API: threadDelayed 7542
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe TID: 5896Thread sleep time: -38747s >= -30000s
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe TID: 5488Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe TID: 5444Thread sleep count: 37 > 30
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe TID: 5444Thread sleep time: -34126476536362649s >= -30000s
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe TID: 5872Thread sleep count: 2225 > 30
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe TID: 5872Thread sleep count: 7542 > 30
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe TID: 5444Thread sleep count: 39 > 30
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeThread delayed: delay time: 38747
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeThread delayed: delay time: 922337203685477
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.491090167.00000000063E0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.491090167.00000000063E0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.491090167.00000000063E0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.491090167.00000000063E0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeCode function: 6_2_01374A78 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeMemory allocated: page read and write | page guard
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeProcess created: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485749282.0000000001C40000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485749282.0000000001C40000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485749282.0000000001C40000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485749282.0000000001C40000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Inv 0110617985 PO Wartsila quantiparts B.V..exe PID: 4472, type: MEMORYSTR
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Inv 0110617985 PO Wartsila quantiparts B.V..exe PID: 4472, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Inv 0110617985 PO Wartsila quantiparts B.V..exe PID: 4472, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection12Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Credentials in Registry1Security Software Discovery111Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Local System2Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelClipboard Data1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing3Cached Domain CredentialsSystem Information Discovery114VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                Behavior Graph

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                Inv 0110617985 PO Wartsila quantiparts B.V..exe71%VirustotalBrowse
                Inv 0110617985 PO Wartsila quantiparts B.V..exe49%MetadefenderBrowse
                Inv 0110617985 PO Wartsila quantiparts B.V..exe86%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                Inv 0110617985 PO Wartsila quantiparts B.V..exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                6.2.Inv 0110617985 PO Wartsila quantiparts B.V..exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                https://2ldxNK2U0Dyorw0.org0%Avira URL Cloudsafe
                http://kgXKqA.com0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1Inv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSInv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                https://2ldxNK2U0Dyorw0.orgInv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://kgXKqA.comInv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haInv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipInv 0110617985 PO Wartsila quantiparts B.V..exe, 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmpfalse
                • URL Reputation: safe
                unknown

                Contacted IPs

                No contacted IP infos

                General Information

                Joe Sandbox Version:33.0.0 White Diamond
                Analysis ID:458946
                Start date:03.08.2021
                Start time:22:20:22
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 5s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:24
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@3/1@0/0
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                22:22:29API Interceptor585x Sleep call for process: Inv 0110617985 PO Wartsila quantiparts B.V..exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Inv 0110617985 PO Wartsila quantiparts B.V..exe.log
                Process:C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1216
                Entropy (8bit):5.355304211458859
                Encrypted:false
                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                Malicious:true
                Reputation:high, very likely benign file
                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.565991695094325
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:Inv 0110617985 PO Wartsila quantiparts B.V..exe
                File size:1315328
                MD5:5c9c7f90ae087c40601f5d6bd85cadb7
                SHA1:15a76b5c5d5ee677f33b76a8371054821c6f6522
                SHA256:2e4901e09f9e7e72b65f301113d5bb075576e02fee03eb8414a986a1cca63cbb
                SHA512:79b82f4867e04356cd8717dee05b993814832d01ebf4f02ec6ec6227e9517a8cdfb960d7a1001f933c37b545fc2e03cb60210ecfc04aed5e19f60e2c3c35395d
                SSDEEP:24576:1sXS/d3NKzksHks2y8jf4HVy9YvHHaWTojUyIbD8N6ZNuZ:bKaw1QWTZbIN6ZNu
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....I.a..............P..............%... ...@....@.. ....................................@................................

                File Icon

                Icon Hash:d8b4e6c6d8d8f2dc

                Static PE Info

                General

                Entrypoint:0x5125ba
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x61024914 [Thu Jul 29 06:22:12 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:v4.0.30319
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                Entrypoint Preview

                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1125680x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1140000x307a8.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1460000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x1105c00x110600False0.868828698658data7.71885600168IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rsrc0x1140000x307a80x30800False0.404905968106data5.84479226844IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1460000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x1142000x8757PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                RT_ICON0x11c9680x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                RT_ICON0x12d1a00x94a8data
                RT_ICON0x1366580x5488data
                RT_ICON0x13baf00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 33023, next used block 4278255616
                RT_ICON0x13fd280x25a8data
                RT_ICON0x1422e00x10a8data
                RT_ICON0x1433980x988data
                RT_ICON0x143d300x468GLS_BINARY_LSB_FIRST
                RT_GROUP_ICON0x1441a80x84data
                RT_VERSION0x14423c0x36cdata
                RT_MANIFEST0x1445b80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                Imports

                DLLImport
                mscoree.dll_CorExeMain

                Version Infos

                DescriptionData
                Translation0x0000 0x04b0
                LegalCopyrightProfitpros (C)
                Assembly Version2.0.5.0
                InternalNameITypeLibImporterNotifySi.exe
                FileVersion2.0.5.0
                CompanyNameProfitpros
                LegalTrademarks
                Comments
                ProductNameform1dan2
                ProductVersion2.0.5.0
                FileDescriptionform1dan2
                OriginalFilenameITypeLibImporterNotifySi.exe

                Network Behavior

                No network behavior found

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:22:22:09
                Start date:03/08/2021
                Path:C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe'
                Imagebase:0xd00000
                File size:1315328 bytes
                MD5 hash:5C9C7F90AE087C40601F5D6BD85CADB7
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Reputation:low

                General

                Start time:22:22:29
                Start date:03/08/2021
                Path:C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\Inv 0110617985 PO Wartsila quantiparts B.V..exe
                Imagebase:0xe20000
                File size:1315328 bytes
                MD5 hash:5C9C7F90AE087C40601F5D6BD85CADB7
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.483047618.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.485981746.0000000003211000.00000004.00000001.sdmp, Author: Joe Security
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >