Loading ...

Play interactive tourEdit tour

Windows Analysis Report Payment_Swift,png.exe

Overview

General Information

Sample Name:Payment_Swift,png.exe
Analysis ID:502638
MD5:f589816b35976438b88a621266d7d071
SHA1:1a845d22e5378b8771536806bb312f6ded7b1046
SHA256:e4c466fd6fb96b2ffc5682a75154df8501c8edb5234b14349ba5c01afc717b12
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Yara detected AgentTesla
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Executable has a suspicious name (potential lure to open the executable)
Moves itself to temp directory
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • Payment_Swift,png.exe (PID: 5908 cmdline: 'C:\Users\user\Desktop\Payment_Swift,png.exe' MD5: F589816B35976438B88A621266D7D071)
    • Payment_Swift,png.exe (PID: 5944 cmdline: 'C:\Users\user\Desktop\Payment_Swift,png.exe' MD5: F589816B35976438B88A621266D7D071)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "info@alishair.rs", "Password": "qR8JmTXtlKf0", "Host": "mail.alishair.rs"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.919115676.0000000004992000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.919115676.0000000004992000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000002.919064429.0000000004950000.00000004.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.919064429.0000000004950000.00000004.00020000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000001.657206121.0000000000400000.00000040.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 14 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.1.Payment_Swift,png.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.1.Payment_Swift,png.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Payment_Swift,png.exe.f001458.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Payment_Swift,png.exe.f001458.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    1.2.Payment_Swift,png.exe.4990000.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 33 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 1.2.Payment_Swift,png.exe.400000.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info@alishair.rs", "Password": "qR8JmTXtlKf0", "Host": "mail.alishair.rs"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Payment_Swift,png.exeVirustotal: Detection: 29%Perma Link
                      Machine Learning detection for sampleShow sources
                      Source: Payment_Swift,png.exeJoe Sandbox ML: detected
                      Source: 1.2.Payment_Swift,png.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 1.1.Payment_Swift,png.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 1.2.Payment_Swift,png.exe.4990000.5.unpackAvira: Label: TR/Spy.Gen8

                      Compliance:

                      barindex
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeUnpacked PE file: 1.2.Payment_Swift,png.exe.400000.1.unpack
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeUnpacked PE file: 1.2.Payment_Swift,png.exe.4990000.5.unpack
                      Source: Payment_Swift,png.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: Binary string: wntdll.pdbUGP source: Payment_Swift,png.exe, 00000000.00000003.656745520.000000000F040000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: Payment_Swift,png.exe, 00000000.00000003.656745520.000000000F040000.00000004.00000001.sdmp
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_00405E93 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_004054BD DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_00402671 FindFirstFileA,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00404A29 FindFirstFileExW,

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49851 -> 78.46.56.160:587
                      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                      Source: global trafficTCP traffic: 192.168.2.4:49851 -> 78.46.56.160:587
                      Source: global trafficTCP traffic: 192.168.2.4:49851 -> 78.46.56.160:587
                      Source: Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpString found in binary or memory: http://RoaIUm.com
                      Source: Payment_Swift,png.exe, 00000001.00000002.918750136.00000000027C8000.00000004.00000001.sdmpString found in binary or memory: http://alishair.rs
                      Source: Payment_Swift,png.exe, 00000001.00000002.918705683.000000000277C000.00000004.00000001.sdmp, Payment_Swift,png.exe, 00000001.00000002.918766104.00000000027D5000.00000004.00000001.sdmp, Payment_Swift,png.exe, 00000001.00000003.868543412.00000000005D4000.00000004.00000001.sdmpString found in binary or memory: http://kTKI1CRL4jwK4qEe.org
                      Source: Payment_Swift,png.exe, 00000001.00000002.918750136.00000000027C8000.00000004.00000001.sdmpString found in binary or memory: http://mail.alishair.rs
                      Source: Payment_Swift,png.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                      Source: Payment_Swift,png.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: Payment_Swift,png.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: mail.alishair.rs
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_00404FC2 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: Payment_Swift,png.exe
                      .NET source code contains very large array initializationsShow sources
                      Source: 1.2.Payment_Swift,png.exe.4990000.5.unpack, u003cPrivateImplementationDetailsu003eu007bECFDFD74u002d3329u002d4626u002dA3C8u002dE4302F1A4829u007d/D3F97F87u002d022Eu002d4672u002dAC2Eu002d7174979C741F.csLarge array initialization: .cctor: array initializer size 11970
                      Executable has a suspicious name (potential lure to open the executable)Show sources
                      Source: Payment_Swift,png.exeStatic file information: Suspicious name
                      Source: Payment_Swift,png.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_004030FB EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_004047D3
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_004061D4
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B6A33
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B6A24
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0040A2A5
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0057EA18
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0057D358
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00572760
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00571FE0
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0094BD28
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00946E48
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0095C1A8
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00954AE8
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00956DB8
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00951620
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00953F20
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0095F8B8
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_009594D0
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00951F98
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_022747A0
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_022746B0
                      Source: Payment_Swift,png.exe, 00000000.00000003.652988324.000000000F2EF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment_Swift,png.exe
                      Source: Payment_Swift,png.exe, 00000000.00000002.659733412.000000000EFF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamedLRvAUZAIMwHAIjyyqmOVnMDGEqKXZyRqf.exe4 vs Payment_Swift,png.exe
                      Source: Payment_Swift,png.exeBinary or memory string: OriginalFilename vs Payment_Swift,png.exe
                      Source: Payment_Swift,png.exe, 00000001.00000002.919115676.0000000004992000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamedLRvAUZAIMwHAIjyyqmOVnMDGEqKXZyRqf.exe4 vs Payment_Swift,png.exe
                      Source: Payment_Swift,png.exe, 00000001.00000002.917122493.0000000000199000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Payment_Swift,png.exe
                      Source: Payment_Swift,png.exeVirustotal: Detection: 29%
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile read: C:\Users\user\Desktop\Payment_Swift,png.exeJump to behavior
                      Source: Payment_Swift,png.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\Payment_Swift,png.exe 'C:\Users\user\Desktop\Payment_Swift,png.exe'
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess created: C:\Users\user\Desktop\Payment_Swift,png.exe 'C:\Users\user\Desktop\Payment_Swift,png.exe'
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess created: C:\Users\user\Desktop\Payment_Swift,png.exe 'C:\Users\user\Desktop\Payment_Swift,png.exe'
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile created: C:\Users\user\AppData\Local\Temp\nspB567.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/1
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_00402053 CoCreateInstance,MultiByteToWideChar,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_00404292 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
                      Source: 1.2.Payment_Swift,png.exe.4990000.5.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 1.2.Payment_Swift,png.exe.4990000.5.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Binary string: wntdll.pdbUGP source: Payment_Swift,png.exe, 00000000.00000003.656745520.000000000F040000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: Payment_Swift,png.exe, 00000000.00000003.656745520.000000000F040000.00000004.00000001.sdmp

                      Data Obfuscation:

                      barindex
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeUnpacked PE file: 1.2.Payment_Swift,png.exe.400000.1.unpack
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeUnpacked PE file: 1.2.Payment_Swift,png.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.gfids:R;.rsrc:R;
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeUnpacked PE file: 1.2.Payment_Swift,png.exe.4990000.5.unpack
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B1080 push eax; ret
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00401F16 push ecx; ret
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00954AE8 push edx; retf
                      Source: qxtkzfqfq.dll.0.drStatic PE information: real checksum: 0x10bc8 should be: 0x15201
                      Source: Payment_Swift,png.exeStatic PE information: real checksum: 0x0 should be: 0x4ea22
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile created: C:\Users\user\AppData\Local\Temp\nskB597.tmp\qxtkzfqfq.dllJump to dropped file

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Moves itself to temp directoryShow sources
                      Source: c:\users\user\desktop\payment_swift,png.exeFile moved: C:\Users\user\AppData\Local\Temp\tmpG130.tmpJump to behavior
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exe TID: 6812Thread sleep time: -11990383647911201s >= -30000s
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exe TID: 7004Thread sleep count: 369 > 30
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exe TID: 7004Thread sleep count: 9485 > 30
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWindow / User API: threadDelayed 369
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWindow / User API: threadDelayed 9485
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_00405E93 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_004054BD DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_00402671 FindFirstFileA,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00404A29 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_004067FE GetProcessHeap,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B6402 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B66C7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B6616 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B6706 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_729B6744 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_004035F1 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0057DEE8 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00401E1D SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeMemory written: C:\Users\user\Desktop\Payment_Swift,png.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeProcess created: C:\Users\user\Desktop\Payment_Swift,png.exe 'C:\Users\user\Desktop\Payment_Swift,png.exe'
                      Source: Payment_Swift,png.exe, 00000001.00000002.918027987.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: Payment_Swift,png.exe, 00000001.00000002.918027987.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Payment_Swift,png.exe, 00000001.00000002.918027987.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: Payment_Swift,png.exe, 00000001.00000002.918027987.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: unknown VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_0040208D cpuid
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 1_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeCode function: 0_2_004030FB EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.f001458.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.4990000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.4950000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.eff0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.415058.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.4950000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.eff0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.725f28.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.725f28.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.f001458.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.3475530.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.3475530.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.415058.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.919115676.0000000004992000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.919064429.0000000004950000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000001.657206121.0000000000400000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.917739877.0000000000708000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.918967419.0000000003471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.659733412.000000000EFF0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.917198466.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Payment_Swift,png.exe PID: 5908, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Payment_Swift,png.exe PID: 5944, type: MEMORYSTR
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\Payment_Swift,png.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: Yara matchFile source: 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Payment_Swift,png.exe PID: 5944, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.f001458.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.4990000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.4950000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.eff0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.415058.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.4950000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.eff0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.725f28.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.725f28.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Payment_Swift,png.exe.f001458.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.3475530.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.1.Payment_Swift,png.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.3475530.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Payment_Swift,png.exe.415058.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.919115676.0000000004992000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.919064429.0000000004950000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000001.657206121.0000000000400000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.917739877.0000000000708000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.918967419.0000000003471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.659733412.000000000EFF0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.917198466.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Payment_Swift,png.exe PID: 5908, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Payment_Swift,png.exe PID: 5944, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Disable or Modify Tools1OS Credential Dumping2System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1Credentials in Registry1File and Directory Discovery2Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSystem Information Discovery127SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing31NTDSQuery Registry1Distributed Component Object ModelClipboard Data1Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery13SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncVirtualization/Sandbox Evasion131Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Payment_Swift,png.exe29%VirustotalBrowse
                      Payment_Swift,png.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      1.2.Payment_Swift,png.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      1.0.Payment_Swift,png.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
                      0.2.Payment_Swift,png.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
                      1.1.Payment_Swift,png.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      1.2.Payment_Swift,png.exe.4990000.5.unpack100%AviraTR/Spy.Gen8Download File
                      0.0.Payment_Swift,png.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://alishair.rs0%Avira URL Cloudsafe
                      http://RoaIUm.com0%Avira URL Cloudsafe
                      http://kTKI1CRL4jwK4qEe.org0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe
                      http://mail.alishair.rs0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      alishair.rs
                      78.46.56.160
                      truetrue
                        unknown
                        mail.alishair.rs
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://api.ipify.org%GETMozilla/5.0Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          low
                          http://DynDns.comDynDNSPayment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://alishair.rsPayment_Swift,png.exe, 00000001.00000002.918750136.00000000027C8000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://RoaIUm.comPayment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://nsis.sf.net/NSIS_ErrorPayment_Swift,png.exefalse
                            high
                            http://nsis.sf.net/NSIS_ErrorErrorPayment_Swift,png.exefalse
                              high
                              http://kTKI1CRL4jwK4qEe.orgPayment_Swift,png.exe, 00000001.00000002.918705683.000000000277C000.00000004.00000001.sdmp, Payment_Swift,png.exe, 00000001.00000002.918766104.00000000027D5000.00000004.00000001.sdmp, Payment_Swift,png.exe, 00000001.00000003.868543412.00000000005D4000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haPayment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPayment_Swift,png.exefalse
                              • URL Reputation: safe
                              unknown
                              https://api.ipify.org%$Payment_Swift,png.exe, 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://mail.alishair.rsPayment_Swift,png.exe, 00000001.00000002.918750136.00000000027C8000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              78.46.56.160
                              alishair.rsGermany
                              24940HETZNER-ASDEtrue

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:502638
                              Start date:14.10.2021
                              Start time:07:56:14
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 6m 47s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Payment_Swift,png.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:18
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/2@2/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 10.5% (good quality ratio 9.9%)
                              • Quality average: 80.7%
                              • Quality standard deviation: 28.6%
                              HCA Information:
                              • Successful, ratio: 82%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 20.82.209.183, 95.100.218.79, 104.94.89.6, 51.124.78.146, 20.50.102.62, 93.184.221.240, 2.20.178.10, 2.20.178.56, 20.54.110.249, 40.112.88.60, 2.20.178.24, 2.20.178.33, 20.82.210.154
                              • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, e11290.dspg.akamaiedge.net, e12564.dspb.akamaiedge.net, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, settingsfd-geo.trafficmanager.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              07:57:15API Interceptor805x Sleep call for process: Payment_Swift,png.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              78.46.56.160DHL_AWB #1008936572891_pdf.exeGet hashmaliciousBrowse
                                DHL_AWB #1008936572891_pdf.exeGet hashmaliciousBrowse
                                  RFQ ICT-200068-MKE-AL ESTISHARI_pdf.exeGet hashmaliciousBrowse
                                    DHL_AWB #1008936572891_pdf.exeGet hashmaliciousBrowse

                                      Domains

                                      No context

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      HETZNER-ASDEPO 211011-021A.exeGet hashmaliciousBrowse
                                      • 136.243.159.53
                                      S27f5MP8UeGet hashmaliciousBrowse
                                      • 5.75.211.8
                                      75lT7DuXrs.exeGet hashmaliciousBrowse
                                      • 168.119.93.163
                                      #Ud83d#Udcde-youse.guia-644-46204-282109.htmGet hashmaliciousBrowse
                                      • 95.217.53.76
                                      6Vk012xoynGet hashmaliciousBrowse
                                      • 144.79.90.35
                                      tmDSSwkOAMGet hashmaliciousBrowse
                                      • 94.130.40.209
                                      8r3HRghvXXGet hashmaliciousBrowse
                                      • 95.217.66.142
                                      ARK Survival legit hack by Spyro.exeGet hashmaliciousBrowse
                                      • 135.181.170.169
                                      M12s7KNFDg.exeGet hashmaliciousBrowse
                                      • 138.201.79.103
                                      NBA 2K21 Cheat by Spyro.exeGet hashmaliciousBrowse
                                      • 135.181.170.169
                                      Gsdqz.dllGet hashmaliciousBrowse
                                      • 116.203.98.109
                                      4tOOUNDwaW.exeGet hashmaliciousBrowse
                                      • 188.34.163.98
                                      7ofFMoirr5.exeGet hashmaliciousBrowse
                                      • 188.34.163.98
                                      HUTWMrDhov.dllGet hashmaliciousBrowse
                                      • 116.203.98.109
                                      SecuriteInfo.com.W32.AIDetect.malware1.10225.exeGet hashmaliciousBrowse
                                      • 188.34.163.98
                                      0q3K4qJqQT.exeGet hashmaliciousBrowse
                                      • 88.99.75.82
                                      SecuriteInfo.com.BackDoor.SpyBotNET.25.23695.exeGet hashmaliciousBrowse
                                      • 116.202.174.203
                                      FTdhc25gn8.exeGet hashmaliciousBrowse
                                      • 88.99.75.82
                                      SecuriteInfo.com.Ransom.Stop.Z5.27157.exeGet hashmaliciousBrowse
                                      • 88.99.75.82
                                      Ref 0180066743.xlsxGet hashmaliciousBrowse
                                      • 136.243.159.53

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      No context

                                      Created / dropped Files

                                      C:\Users\user\AppData\Local\Temp\6bmqgnunlxr262k0wl3
                                      Process:C:\Users\user\Desktop\Payment_Swift,png.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):292863
                                      Entropy (8bit):7.961542825635227
                                      Encrypted:false
                                      SSDEEP:6144:GZOpgRY4xryWx0bo9dQGK6mlH63fS2rAarQiF8/dU2VS1eNY25s:GZO2YSyWldQGNea3fx7xk5S1U6
                                      MD5:4706C84045A7FE8FCE6A281FC0CCE7BE
                                      SHA1:D5F2A41A1822EB56DFCC6ADF1970614F4473200A
                                      SHA-256:17EC196ACCFCC84CE16C5F65FB9DA47F27AD6F3097CF8FA6E844778DFE981D70
                                      SHA-512:D9A571221C6DD7963871A7EE6D6A4530985122E080F860E92090924B285E768FC1C62DBBC520E30C309D08D16BDAA50E7DE025C5159A780F5ED5F389BD35F9E2
                                      Malicious:false
                                      Reputation:low
                                      Preview: U.~.....o.@.H.'.u.Z.t.HJ.-....a..,....d...3.q..y&..N...fX[.|...HC.].e...O.W.T.t.,$...G>..#+.....{..(...',H..a.b.f.....p.T.T..,Gr.X-...S..aRe...4......*..?h..ap"...+.C^`.T.Y.3&W\.x..hvy|v..7Y.t.c^..h.Bi.q!.......A..d..w]M..C.X3......[X$].@..._..bV.".U......#.@..)..?.S.t.HJ.-..Y.........d...3.q..`...N...fe[.....:......%...e(=(K8.s$.Bk.....1.P..L=q..:iv....C.C.V...p.T.T..Q..a.aG.2....N...|.L.[.NV.g...i. ...>.+.......|..@.I......=...V.l......U..%.D..]E....X...&.....09L.].K..oPe8;0....._..bV."........c.@.Y}'.V:Z.t.HJ.-....a..,.....r;..^..3...Nb..fO[..@..:........._.ke(Y.Z[$.$.B.....~6.P.L8N.=:i...p..C.`.".....t..a..~..a.....-......lL..U.NV.g...n.Fu...>..............I......=...V.o......U..%....]E....X...&.....^9L.].K..oPe8;0....._..bV.".U........@.Y:'.V.Z.t.HJ.-....a..,....d...3.q..y&..N...fX[.....:........._.e(=1K..s$.Bk....|1.P..L8q.=:i...p..C.`.....p.T.T..Q..a.aG...-..N....lL..U.NV.g...i. ...>.+............I......=...V.l......U..%....]E....X...&.....^9L
                                      C:\Users\user\AppData\Local\Temp\nskB597.tmp\qxtkzfqfq.dll
                                      Process:C:\Users\user\Desktop\Payment_Swift,png.exe
                                      File Type:PE32 executable (DLL) (native) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):25088
                                      Entropy (8bit):6.390750755627667
                                      Encrypted:false
                                      SSDEEP:384:BreBw0RDT7C1zQb+Lw3wUJnZyzIUFjA4H+mc90DjMTucrg+8X62MWg:mw47C5rw3jngUiimPXM3gtXDM
                                      MD5:0A629D4790598A83061D053F4A3AA8AA
                                      SHA1:F1C78CA24C874E7FC6A7028703C17672BC91167B
                                      SHA-256:07190ACB0AED8A2899CD3EDD16E08E1029C105C5808F7023F3320D3C6378833C
                                      SHA-512:9F9AF53EF9CFCF9D231A4922516483671043A552C06C9310A36A4BFF631F8F8624B1ABBCAA8D4083E7B2E1DEA4AAAC7960E25A90770DEDC1C1AB106CE502A9D0
                                      Malicious:false
                                      Reputation:low
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O............D1...../2.....E.............[......[......[......[.....Rich............................PE..L.....ga...........!.....2...,...............P............................................@..........................U..L....V.......................................U...............................................P..0............................text....0.......2.................. ..`.rdata.......P.......6..............@..@.data...P....`.......F..............@....rsrc................^..............@..B.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................................................

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.936860757189298
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:Payment_Swift,png.exe
                                      File size:282506
                                      MD5:f589816b35976438b88a621266d7d071
                                      SHA1:1a845d22e5378b8771536806bb312f6ded7b1046
                                      SHA256:e4c466fd6fb96b2ffc5682a75154df8501c8edb5234b14349ba5c01afc717b12
                                      SHA512:c6a92f6520791f55b3603472451d09a7ab659cc93f5d66fabaece8293432889be07830a21da65cf8ee2b72d24890e7f571649e9a6f30ece48e7858549a349d67
                                      SSDEEP:6144:wBlL/ceSEIt3R2hNRkzS6xuQaj7knd2aY0Kdu3WP2HMdq78FyDz7:CeXE4BcRsGkd2a33WPkp788
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0(..QF..QF..QF.*^...QF..QG.qQF.*^...QF..rv..QF..W@..QF.Rich.QF.........PE..L...e:.V.................\...........0.......p....@

                                      File Icon

                                      Icon Hash:b2a88c96b2ca6a72

                                      Static PE Info

                                      General

                                      Entrypoint:0x4030fb
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x56FF3A65 [Sat Apr 2 03:20:05 2016 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:b76363e9cb88bf9390860da8e50999d2

                                      Entrypoint Preview

                                      Instruction
                                      sub esp, 00000184h
                                      push ebx
                                      push ebp
                                      push esi
                                      push edi
                                      xor ebx, ebx
                                      push 00008001h
                                      mov dword ptr [esp+20h], ebx
                                      mov dword ptr [esp+14h], 00409168h
                                      mov dword ptr [esp+1Ch], ebx
                                      mov byte ptr [esp+18h], 00000020h
                                      call dword ptr [004070B0h]
                                      call dword ptr [004070ACh]
                                      cmp ax, 00000006h
                                      je 00007FCAFCD6F3A3h
                                      push ebx
                                      call 00007FCAFCD72184h
                                      cmp eax, ebx
                                      je 00007FCAFCD6F399h
                                      push 00000C00h
                                      call eax
                                      mov esi, 00407280h
                                      push esi
                                      call 00007FCAFCD72100h
                                      push esi
                                      call dword ptr [00407108h]
                                      lea esi, dword ptr [esi+eax+01h]
                                      cmp byte ptr [esi], bl
                                      jne 00007FCAFCD6F37Dh
                                      push 0000000Dh
                                      call 00007FCAFCD72158h
                                      push 0000000Bh
                                      call 00007FCAFCD72151h
                                      mov dword ptr [00423F44h], eax
                                      call dword ptr [00407038h]
                                      push ebx
                                      call dword ptr [0040726Ch]
                                      mov dword ptr [00423FF8h], eax
                                      push ebx
                                      lea eax, dword ptr [esp+38h]
                                      push 00000160h
                                      push eax
                                      push ebx
                                      push 0041F4F0h
                                      call dword ptr [0040715Ch]
                                      push 0040915Ch
                                      push 00423740h
                                      call 00007FCAFCD71D84h
                                      call dword ptr [0040710Ch]
                                      mov ebp, 0042A000h
                                      push eax
                                      push ebp
                                      call 00007FCAFCD71D72h
                                      push ebx
                                      call dword ptr [00407144h]

                                      Rich Headers

                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x74180xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x9e0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x70000x27c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x5aeb0x5c00False0.665123980978data6.42230569414IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rdata0x70000x11960x1200False0.458984375data5.20291736659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x90000x1b0380x600False0.432291666667data4.0475118296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                      .ndata0x250000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x2d0000x9e00xa00False0.45625data4.50948350161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0x2d1900x2e8dataEnglishUnited States
                                      RT_DIALOG0x2d4780x100dataEnglishUnited States
                                      RT_DIALOG0x2d5780x11cdataEnglishUnited States
                                      RT_DIALOG0x2d6980x60dataEnglishUnited States
                                      RT_GROUP_ICON0x2d6f80x14dataEnglishUnited States
                                      RT_MANIFEST0x2d7100x2ccXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                      Imports

                                      DLLImport
                                      KERNEL32.dllGetTickCount, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, SetFileAttributesA, CompareFileTime, SearchPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, GetTempPathA, Sleep, lstrcmpiA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrcatA, GetSystemDirectoryA, WaitForSingleObject, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, lstrlenA, GetCommandLineA, GetProcAddress, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, WriteFile, MulDiv, MultiByteToWideChar, LoadLibraryExA, GetModuleHandleA, FreeLibrary
                                      USER32.dllSetCursor, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, EndDialog, ScreenToClient, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetForegroundWindow, GetWindowLongA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, SetTimer, PostQuitMessage, SetWindowLongA, SendMessageTimeoutA, LoadImageA, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, CreateDialogParamA, DestroyWindow, ShowWindow, SetWindowTextA
                                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                      SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteA
                                      ADVAPI32.dllRegDeleteValueA, SetFileSecurityA, RegOpenKeyExA, RegDeleteKeyA, RegEnumValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance

                                      Possible Origin

                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States

                                      Network Behavior

                                      Snort IDS Alerts

                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      10/14/21-07:58:51.611262TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49851587192.168.2.478.46.56.160

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 14, 2021 07:58:49.839961052 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:49.861610889 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:49.863429070 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:50.025907993 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:50.026288986 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:50.048053026 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:50.049133062 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:50.070780039 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:50.071402073 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:50.132988930 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.454746008 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.455575943 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:51.477327108 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.477660894 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:51.540004015 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.588303089 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.588586092 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:51.610236883 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.610255957 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.611262083 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:51.611387968 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:51.612221003 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:51.612308025 CEST49851587192.168.2.478.46.56.160
                                      Oct 14, 2021 07:58:51.633064985 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:58:51.633766890 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:59:03.996406078 CEST5874985178.46.56.160192.168.2.4
                                      Oct 14, 2021 07:59:04.038815022 CEST49851587192.168.2.478.46.56.160

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 14, 2021 07:58:49.642843008 CEST6480153192.168.2.48.8.8.8
                                      Oct 14, 2021 07:58:49.679246902 CEST53648018.8.8.8192.168.2.4
                                      Oct 14, 2021 07:58:49.699117899 CEST6172153192.168.2.48.8.8.8
                                      Oct 14, 2021 07:58:49.717148066 CEST53617218.8.8.8192.168.2.4

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Oct 14, 2021 07:58:49.642843008 CEST192.168.2.48.8.8.80x9cbfStandard query (0)mail.alishair.rsA (IP address)IN (0x0001)
                                      Oct 14, 2021 07:58:49.699117899 CEST192.168.2.48.8.8.80x3a83Standard query (0)mail.alishair.rsA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Oct 14, 2021 07:58:49.679246902 CEST8.8.8.8192.168.2.40x9cbfNo error (0)mail.alishair.rsalishair.rsCNAME (Canonical name)IN (0x0001)
                                      Oct 14, 2021 07:58:49.679246902 CEST8.8.8.8192.168.2.40x9cbfNo error (0)alishair.rs78.46.56.160A (IP address)IN (0x0001)
                                      Oct 14, 2021 07:58:49.717148066 CEST8.8.8.8192.168.2.40x3a83No error (0)mail.alishair.rsalishair.rsCNAME (Canonical name)IN (0x0001)
                                      Oct 14, 2021 07:58:49.717148066 CEST8.8.8.8192.168.2.40x3a83No error (0)alishair.rs78.46.56.160A (IP address)IN (0x0001)

                                      SMTP Packets

                                      TimestampSource PortDest PortSource IPDest IPCommands
                                      Oct 14, 2021 07:58:50.025907993 CEST5874985178.46.56.160192.168.2.4220-thunder.beohosting.com ESMTP Exim 4.94.2 #2 Thu, 14 Oct 2021 07:58:50 +0200
                                      220-We do not authorize the use of this system to transport unsolicited,
                                      220 and/or bulk e-mail.
                                      Oct 14, 2021 07:58:50.026288986 CEST49851587192.168.2.478.46.56.160EHLO 019635
                                      Oct 14, 2021 07:58:50.048053026 CEST5874985178.46.56.160192.168.2.4250-thunder.beohosting.com Hello 019635 [102.129.143.33]
                                      250-SIZE 52428800
                                      250-8BITMIME
                                      250-PIPELINING
                                      250-PIPE_CONNECT
                                      250-AUTH PLAIN LOGIN
                                      250-STARTTLS
                                      250 HELP
                                      Oct 14, 2021 07:58:50.049133062 CEST49851587192.168.2.478.46.56.160AUTH login aW5mb0BhbGlzaGFpci5ycw==
                                      Oct 14, 2021 07:58:50.070780039 CEST5874985178.46.56.160192.168.2.4334 UGFzc3dvcmQ6
                                      Oct 14, 2021 07:58:51.454746008 CEST5874985178.46.56.160192.168.2.4235 Authentication succeeded
                                      Oct 14, 2021 07:58:51.455575943 CEST49851587192.168.2.478.46.56.160MAIL FROM:<info@alishair.rs>
                                      Oct 14, 2021 07:58:51.477327108 CEST5874985178.46.56.160192.168.2.4250 OK
                                      Oct 14, 2021 07:58:51.477660894 CEST49851587192.168.2.478.46.56.160RCPT TO:<auto.metal@techie.com>
                                      Oct 14, 2021 07:58:51.588303089 CEST5874985178.46.56.160192.168.2.4250 Accepted
                                      Oct 14, 2021 07:58:51.588586092 CEST49851587192.168.2.478.46.56.160DATA
                                      Oct 14, 2021 07:58:51.610255957 CEST5874985178.46.56.160192.168.2.4354 Enter message, ending with "." on a line by itself
                                      Oct 14, 2021 07:58:51.612308025 CEST49851587192.168.2.478.46.56.160.
                                      Oct 14, 2021 07:59:03.996406078 CEST5874985178.46.56.160192.168.2.4250 OK id=1matlX-004vNk-6b

                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:07:57:02
                                      Start date:14/10/2021
                                      Path:C:\Users\user\Desktop\Payment_Swift,png.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\Payment_Swift,png.exe'
                                      Imagebase:0x400000
                                      File size:282506 bytes
                                      MD5 hash:F589816B35976438B88A621266D7D071
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.659733412.000000000EFF0000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.659733412.000000000EFF0000.00000004.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      General

                                      Start time:07:57:04
                                      Start date:14/10/2021
                                      Path:C:\Users\user\Desktop\Payment_Swift,png.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\Payment_Swift,png.exe'
                                      Imagebase:0x400000
                                      File size:282506 bytes
                                      MD5 hash:F589816B35976438B88A621266D7D071
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.919115676.0000000004992000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.919115676.0000000004992000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.919064429.0000000004950000.00000004.00020000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.919064429.0000000004950000.00000004.00020000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000001.657206121.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000001.657206121.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.917739877.0000000000708000.00000004.00000020.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.917739877.0000000000708000.00000004.00000020.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.918967419.0000000003471000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.918967419.0000000003471000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.917198466.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.917198466.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.918296009.0000000002471000.00000004.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      Disassembly

                                      Code Analysis

                                      Reset < >