Loading ...

Play interactive tourEdit tour

Windows Analysis Report Quotation for Enq # 90038355.exe

Overview

General Information

Sample Name:Quotation for Enq # 90038355.exe
Analysis ID:483892
MD5:344ba2ed272ba7e67556b82f312ea816
SHA1:e1d5527552a9879bfded79c3c76a673913e15ada
SHA256:9b4cb73e87053b62028a877f31ffba62960560bf707fa0458b3acc0899e942dd
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: MSBuild connects to smtp port
Installs a global keyboard hook
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Binary contains a suspicious time stamp
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • Quotation for Enq # 90038355.exe (PID: 5192 cmdline: 'C:\Users\user\Desktop\Quotation for Enq # 90038355.exe' MD5: 344BA2ED272BA7E67556B82F312EA816)
    • MSBuild.exe (PID: 1848 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "share@phoenixfinance.com.bd", "Password": "Pfil*786", "Host": "mail.phoenixfinance.com.bd"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.Quotation for Enq # 90038355.exe.420acc8.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Quotation for Enq # 90038355.exe.420acc8.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.Quotation for Enq # 90038355.exe.420acc8.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      Networking:

                      barindex
                      Sigma detected: MSBuild connects to smtp portShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.185.108.208, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 1848, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49832

                      System Summary:

                      barindex
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ParentCommandLine: 'C:\Users\user\Desktop\Quotation for Enq # 90038355.exe' , ParentImage: C:\Users\user\Desktop\Quotation for Enq # 90038355.exe, ParentProcessId: 5192, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 1848

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.Quotation for Enq # 90038355.exe.420acc8.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "share@phoenixfinance.com.bd", "Password": "Pfil*786", "Host": "mail.phoenixfinance.com.bd"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Quotation for Enq # 90038355.exeVirustotal: Detection: 32%Perma Link
                      Source: Quotation for Enq # 90038355.exeReversingLabs: Detection: 26%
                      Machine Learning detection for sampleShow sources
                      Source: Quotation for Enq # 90038355.exeJoe Sandbox ML: detected
                      Source: 2.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: Quotation for Enq # 90038355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Quotation for Enq # 90038355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Networking:

                      barindex
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49681 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                      Source: unknownNetwork traffic detected: HTTP traffic on port 50120 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50119
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49681
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50120
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: http://bJvmVK.com
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                      Source: MSBuild.exe, 00000002.00000002.935578751.000000000648B000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsenc
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                      Source: MSBuild.exe, 00000002.00000002.934081784.0000000003706000.00000004.00000001.sdmpString found in binary or memory: http://mail.phoenixfinance.com.bd
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0v
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: https://YWRIJujMGl.org
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: https://YWRIJujMGl.orgD0=
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: mail.phoenixfinance.com.bd

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669555775.00000000015AB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: Quotation for Enq # 90038355.exe
                      .NET source code contains very large stringsShow sources
                      Source: Quotation for Enq # 90038355.exe, Forms/mainForm.csLong String: Length: 38272
                      Source: 0.0.Quotation for Enq # 90038355.exe.e60000.0.unpack, Forms/mainForm.csLong String: Length: 38272
                      Source: 0.2.Quotation for Enq # 90038355.exe.e60000.0.unpack, Forms/mainForm.csLong String: Length: 38272
                      Source: Quotation for Enq # 90038355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_0159C124
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_0159E570
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_0159E563
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05143275
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05142E90
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05143B48
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05146BB8
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05141478
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05141468
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_051434A8
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_051437B0
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_051437C0
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05143D41
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05140D78
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05140D67
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05142E80
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05143B39
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05E2B6CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05E2D158
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05E21360
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05E2D868
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066DD65F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D9F94
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D5D78
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066DDAB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066DBBC1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D0086
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D6E68
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D6E5C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D8D70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_07172C58
                      Source: Quotation for Enq # 90038355.exeBinary or memory string: OriginalFilename vs Quotation for Enq # 90038355.exe
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000000.661886892.0000000000E62000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEVENTFILTERDESCRIPT.exe4 vs Quotation for Enq # 90038355.exe
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamejsUtdMNBeuhbNnokaRBAyEynyJeXUAQH.exe4 vs Quotation for Enq # 90038355.exe
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.670396850.0000000004311000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs Quotation for Enq # 90038355.exe
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669555775.00000000015AB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation for Enq # 90038355.exe
                      Source: Quotation for Enq # 90038355.exeBinary or memory string: OriginalFilenameEVENTFILTERDESCRIPT.exe4 vs Quotation for Enq # 90038355.exe
                      Source: Quotation for Enq # 90038355.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Quotation for Enq # 90038355.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Quotation for Enq # 90038355.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: Quotation for Enq # 90038355.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Quotation for Enq # 90038355.exeVirustotal: Detection: 32%
                      Source: Quotation for Enq # 90038355.exeReversingLabs: Detection: 26%
                      Source: Quotation for Enq # 90038355.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\Quotation for Enq # 90038355.exe 'C:\Users\user\Desktop\Quotation for Enq # 90038355.exe'
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation for Enq # 90038355.exe.logJump to behavior
                      Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@3/2@2/1
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMutant created: \Sessions\1\BaseNamedObjects\NFGbaNkhdbYRiBBEDhHWGl
                      Source: Quotation for Enq # 90038355.exe, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.0.Quotation for Enq # 90038355.exe.e60000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.Quotation for Enq # 90038355.exe.e60000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Quotation for Enq # 90038355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Quotation for Enq # 90038355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Quotation for Enq # 90038355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                      Data Obfuscation:

                      barindex
                      .NET source code contains potential unpackerShow sources
                      Source: Quotation for Enq # 90038355.exe, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.0.Quotation for Enq # 90038355.exe.e60000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.2.Quotation for Enq # 90038355.exe.e60000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_0159B5D1 pushad ; retf
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_0159F933 push esp; iretd
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_0514289F push edx; retf
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeCode function: 0_2_05142898 push edx; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_05E20BCE push ss; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D3C2B push 0000001Ah; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D3DB5 push es; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D9A5F push ss; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D5BE8 push ss; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_066D41E1 push es; ret
                      Source: Quotation for Enq # 90038355.exeStatic PE information: 0xC4BE8666 [Mon Aug 6 22:36:22 2074 UTC]
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.22138751359

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
                      Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon2083.png
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quotation for Enq # 90038355.exe PID: 5192, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exe TID: 5416Thread sleep time: -39332s >= -30000s
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exe TID: 3112Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6092Thread sleep time: -14757395258967632s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5688Thread sleep count: 9535 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5688Thread sleep count: 315 > 30
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 9535
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeThread delayed: delay time: 39332
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: Quotation for Enq # 90038355.exe, 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: MSBuild.exe, 00000002.00000002.935518873.000000000647B000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 438000
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43A000
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 10F6008
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and write
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: MSBuild.exe, 00000002.00000002.932796844.0000000001D40000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: MSBuild.exe, 00000002.00000002.932796844.0000000001D40000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: MSBuild.exe, 00000002.00000002.932796844.0000000001D40000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: MSBuild.exe, 00000002.00000002.932796844.0000000001D40000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeQueries volume information: C:\Users\user\Desktop\Quotation for Enq # 90038355.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Quotation for Enq # 90038355.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.Quotation for Enq # 90038355.exe.420acc8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation for Enq # 90038355.exe.420acc8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.670112007.0000000004149000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quotation for Enq # 90038355.exe PID: 5192, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1848, type: MEMORYSTR
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: Yara matchFile source: 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1848, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.Quotation for Enq # 90038355.exe.420acc8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quotation for Enq # 90038355.exe.420acc8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.670112007.0000000004149000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quotation for Enq # 90038355.exe PID: 5192, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1848, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection312Disable or Modify Tools1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1Input Capture111Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Credentials in Registry1Security Software Discovery211SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput Capture111Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsVirtualization/Sandbox Evasion131SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading11Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Quotation for Enq # 90038355.exe33%VirustotalBrowse
                      Quotation for Enq # 90038355.exe27%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      Quotation for Enq # 90038355.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      mail.phoenixfinance.com.bd0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://cps.root-x1.letsenc0%Avira URL Cloudsafe
                      http://cps.letsencrypt.org00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://mail.phoenixfinance.com.bd0%VirustotalBrowse
                      http://mail.phoenixfinance.com.bd0%Avira URL Cloudsafe
                      https://YWRIJujMGl.org0%Avira URL Cloudsafe
                      http://r3.i.lencr.org/0v0%Avira URL Cloudsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://bJvmVK.com0%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://YWRIJujMGl.orgD0=0%Avira URL Cloudsafe
                      http://cps.root-x1.letsencrypt.org00%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.phoenixfinance.com.bd
                      192.185.108.208
                      truetrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSMSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://cps.root-x1.letsencMSBuild.exe, 00000002.00000002.935578751.000000000648B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://cps.letsencrypt.org0MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.c.lencr.org/0MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://mail.phoenixfinance.com.bdMSBuild.exe, 00000002.00000002.934081784.0000000003706000.00000004.00000001.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://YWRIJujMGl.orgMSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r3.i.lencr.org/0vMSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r3.o.lencr.org0MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://bJvmVK.comMSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.org%GETMozilla/5.0MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      low
                      https://api.ipify.org%MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      low
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipQuotation for Enq # 90038355.exe, 00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://YWRIJujMGl.orgD0=MSBuild.exe, 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://cps.root-x1.letsencrypt.org0MSBuild.exe, 00000002.00000002.935633413.00000000064A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      192.185.108.208
                      mail.phoenixfinance.com.bdUnited States
                      46606UNIFIEDLAYER-AS-1UStrue

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:483892
                      Start date:15.09.2021
                      Start time:15:48:07
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 51s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:Quotation for Enq # 90038355.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.spre.troj.spyw.evad.winEXE@3/2@2/1
                      EGA Information:Failed
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .exe
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                      • TCP Packets have been reduced to 100
                      • Excluded IPs from analysis (whitelisted): 20.82.209.183, 20.54.110.249, 40.112.88.60, 8.248.133.254, 67.26.137.254, 8.253.95.249, 67.26.73.254, 8.248.145.254, 23.216.77.208, 23.216.77.209, 20.82.210.154
                      • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fg.download.windowsupdate.com.c.footprint.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      15:49:05API Interceptor1x Sleep call for process: Quotation for Enq # 90038355.exe modified
                      15:49:19API Interceptor815x Sleep call for process: MSBuild.exe modified

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      192.185.108.208Required Items.exeGet hashmaliciousBrowse

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        mail.phoenixfinance.com.bdRequired Items.exeGet hashmaliciousBrowse
                        • 192.185.108.208

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        UNIFIEDLAYER-AS-1USHolidays_2018.docGet hashmaliciousBrowse
                        • 192.185.73.57
                        Remittance_Advice_details001009142021.xlsxGet hashmaliciousBrowse
                        • 50.87.248.20
                        Unpaid invoice.exeGet hashmaliciousBrowse
                        • 50.87.144.47
                        SOA for V.R at USD.exeGet hashmaliciousBrowse
                        • 192.185.90.36
                        re2.arm7Get hashmaliciousBrowse
                        • 69.195.102.115
                        PO. 2100002_pdf____________________________________.exeGet hashmaliciousBrowse
                        • 108.167.140.157
                        6522TrkXwt.exeGet hashmaliciousBrowse
                        • 67.20.76.71
                        SecuriteInfo.com.Variant.Barys.5541.5151.exeGet hashmaliciousBrowse
                        • 192.185.171.219
                        EM2scqNkrv.exeGet hashmaliciousBrowse
                        • 192.185.84.191
                        opZ766Gf7j.exeGet hashmaliciousBrowse
                        • 192.185.171.144
                        diagram-129.docGet hashmaliciousBrowse
                        • 192.185.17.114
                        diagram-129.docGet hashmaliciousBrowse
                        • 192.185.17.114
                        diagram-129.docGet hashmaliciousBrowse
                        • 192.185.17.114
                        vREfw6lnNC.exeGet hashmaliciousBrowse
                        • 192.185.84.191
                        vbc.exeGet hashmaliciousBrowse
                        • 50.87.144.47
                        diagram-477.docGet hashmaliciousBrowse
                        • 192.185.17.114
                        diagram-477.docGet hashmaliciousBrowse
                        • 192.185.17.114
                        diagram-477.docGet hashmaliciousBrowse
                        • 192.185.17.114
                        8765998RQF.docGet hashmaliciousBrowse
                        • 192.185.171.144
                        Quotation Required PO3652.docGet hashmaliciousBrowse
                        • 192.185.84.191

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation for Enq # 90038355.exe.log
                        Process:C:\Users\user\Desktop\Quotation for Enq # 90038355.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1216
                        Entropy (8bit):5.355304211458859
                        Encrypted:false
                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                        Malicious:true
                        Reputation:high, very likely benign file
                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                        C:\Users\user\AppData\Roaming\0vddojdc.nzw\Chrome\Default\Cookies
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3032001
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.7006690334145785
                        Encrypted:false
                        SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                        MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                        SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                        SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                        SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.232670452918804
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:Quotation for Enq # 90038355.exe
                        File size:638976
                        MD5:344ba2ed272ba7e67556b82f312ea816
                        SHA1:e1d5527552a9879bfded79c3c76a673913e15ada
                        SHA256:9b4cb73e87053b62028a877f31ffba62960560bf707fa0458b3acc0899e942dd
                        SHA512:d28d70b52a61a6b7ef821a6569675aff50f367122d892630b1d0c46df74263c8614f894a5671425fcbc4abfe4057cb6bb492ba44a80f26845300a02f1509ab3c
                        SSDEEP:12288:B7u7777K7qWHCM2K4CsQQpOEpAKKeOwDS31yPdzusCDk9dWI2Pv1f3eQU7:B7u7777K7G3CsYEpDKeus6esPdeZ
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...f.................0.............z.... ........@.. ....................... ............@................................

                        File Icon

                        Icon Hash:e4e2aa8aa4b4bcb4

                        Static PE Info

                        General

                        Entrypoint:0x48d47a
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0xC4BE8666 [Mon Aug 6 22:36:22 2074 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v4.0.30319
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                        Entrypoint Preview

                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8d4280x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x105a4.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x8d40c0x1c.text
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x8b4800x8b600False0.767732272982data7.22138751359IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0x8e0000x105a40x10600False0.795160424618data7.29487316941IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xa00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x8e2b00x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 4294967295, next used block 8912767
                        RT_ICON0x8e5980x128GLS_BINARY_LSB_FIRST
                        RT_ICON0x8e6c00xea8data
                        RT_ICON0x8f5680x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
                        RT_ICON0x8fe100x568GLS_BINARY_LSB_FIRST
                        RT_ICON0x903780xa1bePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                        RT_ICON0x9a5380x25a8data
                        RT_ICON0x9cae00x10a8data
                        RT_ICON0x9db880x468GLS_BINARY_LSB_FIRST
                        RT_GROUP_ICON0x9dff00x84data
                        RT_VERSION0x9e0740x344data
                        RT_MANIFEST0x9e3b80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                        Imports

                        DLLImport
                        mscoree.dll_CorExeMain

                        Version Infos

                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightCopyright 2019
                        Assembly Version1.0.0.0
                        InternalNameEVENTFILTERDESCRIPT.exe
                        FileVersion1.0.0.0
                        CompanyName
                        LegalTrademarks
                        Comments
                        ProductNameDisciples
                        ProductVersion1.0.0.0
                        FileDescriptionDisciples
                        OriginalFilenameEVENTFILTERDESCRIPT.exe

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Sep 15, 2021 15:48:57.287492990 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.287550926 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.287982941 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.288674116 CEST49723443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.288913012 CEST4434972392.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.288965940 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.288990974 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.289015055 CEST49723443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.321923971 CEST4434972492.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.321974039 CEST4434972492.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.322097063 CEST49724443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.322129011 CEST4434972492.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.322150946 CEST49724443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.322192907 CEST49724443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.354331970 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.354444027 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.354917049 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.354931116 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.356491089 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.356503963 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.420245886 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.420299053 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.420475960 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.420552015 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.420738935 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.520199060 CEST4434972492.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.520916939 CEST49724443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.526238918 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.526475906 CEST4434972592.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.526613951 CEST49725443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.533370972 CEST49724443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.533411980 CEST4434972492.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.896029949 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.896070004 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.896205902 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.899234056 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.899344921 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.977660894 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.977799892 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.978212118 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.978230000 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:57.979213953 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:57.979234934 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.055659056 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.055731058 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.055816889 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.055845976 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.055879116 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.055896997 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.059037924 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.059308052 CEST4434972692.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.059401035 CEST49726443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.061192036 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.061252117 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.061355114 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.061563969 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.061578989 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.118693113 CEST49728443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.118752956 CEST4434972892.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.118912935 CEST49728443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.119136095 CEST49728443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.119148970 CEST4434972892.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.126696110 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.126818895 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.127615929 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.127629995 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.133393049 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.133554935 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.178601980 CEST49729443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.178646088 CEST4434972992.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.179754972 CEST49729443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.179828882 CEST49729443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.179838896 CEST4434972992.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.196059942 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.196096897 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.196167946 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.196216106 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.196243048 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.196269035 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.199928045 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.200052977 CEST4434972792.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.200134039 CEST49727443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.204236984 CEST4434972892.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.204338074 CEST49728443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.204526901 CEST49730443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.204576015 CEST4434973092.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.204668999 CEST49730443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.205002069 CEST49728443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.205022097 CEST4434972892.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.205507040 CEST49730443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.205543041 CEST4434973092.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.205895901 CEST49728443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.205914021 CEST4434972892.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.218622923 CEST49731443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.218678951 CEST4434973192.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.218777895 CEST49731443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.218964100 CEST49731443192.168.2.492.122.145.220
                        Sep 15, 2021 15:48:58.218974113 CEST4434973192.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.259402990 CEST4434972992.122.145.220192.168.2.4
                        Sep 15, 2021 15:48:58.259536982 CEST49729443192.168.2.492.122.145.220

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Sep 15, 2021 15:49:27.664176941 CEST6238953192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:27.707792997 CEST53623898.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:46.827135086 CEST4991053192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:46.861912012 CEST53499108.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:47.550666094 CEST5585453192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:47.577120066 CEST53558548.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:48.271703005 CEST6454953192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:48.285703897 CEST6315353192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:48.300607920 CEST53645498.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:48.343003035 CEST53631538.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:48.741718054 CEST5299153192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:48.775227070 CEST53529918.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:49.535907030 CEST5370053192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:49.561094999 CEST53537008.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:49.564037085 CEST5172653192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:49.593941927 CEST53517268.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:51.593064070 CEST5679453192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:51.621278048 CEST53567948.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:52.150434971 CEST5653453192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:52.183383942 CEST53565348.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:52.955502033 CEST5662753192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:52.997867107 CEST53566278.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:53.758229971 CEST5662153192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:53.818658113 CEST53566218.8.8.8192.168.2.4
                        Sep 15, 2021 15:49:54.224062920 CEST6311653192.168.2.48.8.8.8
                        Sep 15, 2021 15:49:54.250859976 CEST53631168.8.8.8192.168.2.4
                        Sep 15, 2021 15:50:05.937798023 CEST6407853192.168.2.48.8.8.8
                        Sep 15, 2021 15:50:05.968036890 CEST53640788.8.8.8192.168.2.4
                        Sep 15, 2021 15:50:36.153079033 CEST6480153192.168.2.48.8.8.8
                        Sep 15, 2021 15:50:36.179893017 CEST53648018.8.8.8192.168.2.4
                        Sep 15, 2021 15:50:38.222614050 CEST6172153192.168.2.48.8.8.8
                        Sep 15, 2021 15:50:38.255414009 CEST53617218.8.8.8192.168.2.4
                        Sep 15, 2021 15:50:51.529833078 CEST5125553192.168.2.48.8.8.8
                        Sep 15, 2021 15:50:51.575917006 CEST53512558.8.8.8192.168.2.4
                        Sep 15, 2021 15:50:56.501589060 CEST6152253192.168.2.48.8.8.8
                        Sep 15, 2021 15:50:56.575808048 CEST53615228.8.8.8192.168.2.4

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Sep 15, 2021 15:50:51.529833078 CEST192.168.2.48.8.8.80x30cfStandard query (0)mail.phoenixfinance.com.bdA (IP address)IN (0x0001)
                        Sep 15, 2021 15:50:56.501589060 CEST192.168.2.48.8.8.80x6619Standard query (0)mail.phoenixfinance.com.bdA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Sep 15, 2021 15:50:51.575917006 CEST8.8.8.8192.168.2.40x30cfNo error (0)mail.phoenixfinance.com.bd192.185.108.208A (IP address)IN (0x0001)
                        Sep 15, 2021 15:50:56.575808048 CEST8.8.8.8192.168.2.40x6619No error (0)mail.phoenixfinance.com.bd192.185.108.208A (IP address)IN (0x0001)

                        SMTP Packets

                        TimestampSource PortDest PortSource IPDest IPCommands
                        Sep 15, 2021 15:50:52.065447092 CEST58749832192.185.108.208192.168.2.4220-ascender.websitewelcome.com ESMTP Exim 4.94.2 #2 Wed, 15 Sep 2021 08:50:51 -0500
                        220-We do not authorize the use of this system to transport unsolicited,
                        220 and/or bulk e-mail.
                        Sep 15, 2021 15:50:52.089365959 CEST49832587192.168.2.4192.185.108.208EHLO 019635
                        Sep 15, 2021 15:50:52.235933065 CEST58749832192.185.108.208192.168.2.4250-ascender.websitewelcome.com Hello 019635 [84.17.52.51]
                        250-SIZE 52428800
                        250-8BITMIME
                        250-PIPELINING
                        250-PIPE_CONNECT
                        250-AUTH PLAIN LOGIN
                        250-STARTTLS
                        250 HELP
                        Sep 15, 2021 15:50:52.236485004 CEST49832587192.168.2.4192.185.108.208STARTTLS
                        Sep 15, 2021 15:50:52.385957003 CEST58749832192.185.108.208192.168.2.4220 TLS go ahead
                        Sep 15, 2021 15:50:56.875197887 CEST58749833192.185.108.208192.168.2.4220-ascender.websitewelcome.com ESMTP Exim 4.94.2 #2 Wed, 15 Sep 2021 08:50:56 -0500
                        220-We do not authorize the use of this system to transport unsolicited,
                        220 and/or bulk e-mail.
                        Sep 15, 2021 15:50:56.875521898 CEST49833587192.168.2.4192.185.108.208EHLO 019635
                        Sep 15, 2021 15:50:57.022568941 CEST58749833192.185.108.208192.168.2.4250-ascender.websitewelcome.com Hello 019635 [84.17.52.51]
                        250-SIZE 52428800
                        250-8BITMIME
                        250-PIPELINING
                        250-PIPE_CONNECT
                        250-AUTH PLAIN LOGIN
                        250-STARTTLS
                        250 HELP
                        Sep 15, 2021 15:50:57.023036003 CEST49833587192.168.2.4192.185.108.208STARTTLS
                        Sep 15, 2021 15:50:57.174768925 CEST58749833192.185.108.208192.168.2.4220 TLS go ahead

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:15:49:03
                        Start date:15/09/2021
                        Path:C:\Users\user\Desktop\Quotation for Enq # 90038355.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\Quotation for Enq # 90038355.exe'
                        Imagebase:0xe60000
                        File size:638976 bytes
                        MD5 hash:344BA2ED272BA7E67556B82F312EA816
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.669711456.0000000003141000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.670463877.00000000043B4000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.670112007.0000000004149000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.670112007.0000000004149000.00000004.00000001.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:15:49:06
                        Start date:15/09/2021
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Imagebase:0xe40000
                        File size:261728 bytes
                        MD5 hash:D621FD77BD585874F9686D3A76462EF1
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.931030895.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.933029235.0000000003351000.00000004.00000001.sdmp, Author: Joe Security
                        Reputation:high

                        Disassembly

                        Code Analysis

                        Reset < >