Loading ...

Play interactive tourEdit tour

Windows Analysis Report Justificante de Pago 25112021.pdf _.exe

Overview

General Information

Sample Name:Justificante de Pago 25112021.pdf _.exe
Analysis ID:528616
MD5:494cd8be1913f9def79b10031587aa8a
SHA1:ff74b67fa7c03d4fb388f49289ff14639656b3d3
SHA256:75934da02313e0d772b4703bfaa3331311fc5a2b981f8ff0e455795bc3448ddb
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Potential malicious icon found
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
Hides threads from debuggers
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
C2 URLs / IPs found in malware configuration
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Creates processes with suspicious names
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Tries to load missing DLLs
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Uses SMTP (mail sending)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64native
  • Justificante de Pago 25112021.pdf _.exe (PID: 2088 cmdline: "C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe" MD5: 494CD8BE1913F9DEF79B10031587AA8A)
    • CasPol.exe (PID: 8168 cmdline: "C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 5588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "dherdiana@rpxholding.comdha10apasmtp.rpxholding.comjo.esg2000@gmail.com"}

Threatname: GuLoader

{"Payload URL": "https://onedrive.live.com/download?c"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000009.00000000.78170639033.0000000000B40000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: CasPol.exe PID: 8168JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: CasPol.exe PID: 8168JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000009.00000000.78170639033.0000000000B40000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?c"}
            Source: conhost.exe.5588.10.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "dherdiana@rpxholding.comdha10apasmtp.rpxholding.comjo.esg2000@gmail.com"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: Justificante de Pago 25112021.pdf _.exeVirustotal: Detection: 35%Perma Link
            Source: Justificante de Pago 25112021.pdf _.exeReversingLabs: Detection: 17%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F6C4B8 CryptUnprotectData,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F6C4B0 CryptUnprotectData,
            Source: Justificante de Pago 25112021.pdf _.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\SKIBSBES.pdb source: Justificante de Pago 25112021.pdf _.exe

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.11.20:49828 -> 202.158.48.236:587
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://onedrive.live.com/download?c
            Source: Joe Sandbox ViewASN Name: ASN-CBNPTCyberindoAditamaID ASN-CBNPTCyberindoAditamaID
            Source: global trafficTCP traffic: 192.168.11.20:49828 -> 202.158.48.236:587
            Source: global trafficTCP traffic: 192.168.11.20:49828 -> 202.158.48.236:587
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: CasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: subdomain_match":["go","tv"]},{"applied_policy":"EdgeUA","domain":"video.zhihu.com"},{"applied_policy":"ChromeUA","domain":"la7.it"},{"applied_policy":"ChromeUA","domain":"ide.cs50.io"},{"applied_policy":"ChromeUA","domain":"moneygram.com"},{"applied_policy":"ChromeUA","domain":"blog.esuteru.com"},{"applied_policy":"ChromeUA","domain":"online.tivo.com","path_match":["/start"]},{"applied_policy":"ChromeUA","domain":"smallbusiness.yahoo.com","path_match":["/businessmaker"]},{"applied_policy":"ChromeUA","domain":"jeeready.amazon.in","path_match":["/home"]},{"applied_policy":"ChromeUA","domain":"abc.com"},{"applied_policy":"ChromeUA","domain":"mvsrec738.examly.io"},{"applied_policy":"ChromeUA","domain":"myslate.sixphrase.com"},{"applied_policy":"ChromeUA","domain":"search.norton.com","path_match":["/nsssOnboarding"]},{"applied_policy":"ChromeUA","domain":"checkdecide.com"},{"applied_policy":"ChromeUA","domain":"virtualvisitlogin.partners.org"},{"applied_policy":"ChromeUA","domain":"carelogin.bryantelemedicine.com"},{"applied_policy":"ChromeUA","domain":"providerstc.hs.utah.gov"},{"applied_policy":"ChromeUA","domain":"applychildcaresubsidy.alberta.ca"},{"applied_policy":"ChromeUA","domain":"elearning.evn.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"telecare.keckmedicine.org"},{"applied_policy":"ChromeUA","domain":"authoring.amirsys.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"elearning.seabank.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"app.fields.corteva.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"gsq.minornet.com"},{"applied_policy":"ChromeUA","domain":"shop.lic.co.nz"},{"applied_policy":"ChromeUA","domain":"telehealthportal.uofuhealth.org"},{"applied_policy":"ChromeUA","domain":"portal.centurylink.com"},{"applied_policy":"ChromeUA","domain":"visitnow.org"},{"applied_policy":"ChromeUA","domain":"www.hotstar.com","path_match":["/in/subscribe/payment/methods/dc","/in/subscribe/payment/methods/cc"]},{"applied_policy":"ChromeUA","domain":"tryca.st","path_match":["/studio","/publisher"]},{"applied_policy":"ChromeUA","domain":"telemost.yandex.ru"},{"applied_policy":"ChromeUA","domain":"astrogo.astro.com.my"},{"applied_policy":"ChromeUA","domain":"airbornemedia.gogoinflight.com"},{"applied_policy":"ChromeUA","domain":"itoaxaca.mindbox.app"},{"applied_policy":"ChromeUA","domain":"app.classkick.com"},{"applied_policy":"ChromeUA","domain":"exchangeservicecenter.com","path_match":["/freeze"]},{"applied_policy":"ChromeUA","domain":"bancodeoccidente.com.co","path_match":["/portaltransaccional"]},{"applied_policy":"ChromeUA","domain":"better.com"},{"applied_policy":"IEUA","domain":"bm.gzekao.cn","path_match":["/tr/webregister/"]},{"applied_policy":"ChromeUA","domain":"scheduling.care.psjhealth.org","path_match":["/virtual"]},{"applied_policy":"ChromeUA","domain":"salud.go.cr"},{"applied_policy":"ChromeUA","domain":"learning.chungdahm.com"},{"applied_policy":"C
            Source: CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: CasPol.exe, 00000009.00000003.78500301270.0000000000DF4000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmp, CasPol.exe, 00000009.00000003.78499975366.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78491920063.0000000000DF1000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: CasPol.exe, 00000009.00000003.78500301270.0000000000DF4000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmp, CasPol.exe, 00000009.00000003.78499975366.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78491920063.0000000000DF1000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: CasPol.exe, 00000009.00000002.82850173263.000000001DD91000.00000004.00000001.sdmpString found in binary or memory: http://mails.rpxholding.com
            Source: CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpString found in binary or memory: http://rOTpQz.com
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: http://s.symcd.com06
            Source: CasPol.exe, 00000009.00000002.82850173263.000000001DD91000.00000004.00000001.sdmpString found in binary or memory: http://smtp.rpxholding.com
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: CasPol.exe, 00000009.00000002.82850050864.000000001DD87000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.79425673584.000000001CA61000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82850257454.000000001DD9F000.00000004.00000001.sdmpString found in binary or memory: http://x9bGZRuBZN1f4.com
            Source: CasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://x9bGZRuBZN1f4.comT
            Source: CasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: http://x9bGZRuBZN1f4.comt-~l
            Source: CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%4
            Source: CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: https://d.symcb.com/cps0%
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: https://d.symcb.com/rpa0
            Source: Justificante de Pago 25112021.pdf _.exeString found in binary or memory: https://d.symcb.com/rpa0.
            Source: CasPol.exe, 00000009.00000003.78499975366.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78500507187.0000000000E25000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78491920063.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78492247430.0000000000E25000.00000004.00000001.sdmpString found in binary or memory: https://eruweq.bl.files.1drv.com/
            Source: CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmp, CasPol.exe, 00000009.00000003.78500507187.0000000000E25000.00000004.00000001.sdmpString found in binary or memory: https://eruweq.bl.files.1drv.com/=
            Source: CasPol.exe, 00000009.00000003.78492247430.0000000000E25000.00000004.00000001.sdmpString found in binary or memory: https://eruweq.bl.files.1drv.com/y
            Source: CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmp, CasPol.exe, 00000009.00000003.78499975366.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78500507187.0000000000E25000.00000004.00000001.sdmpString found in binary or memory: https://eruweq.bl.files.1drv.com/y4mTi8F-5UT5v8gCCgHyyTjEWDMrhmEHc1_AIKHcGNjnR2bGYZ0rh8uS1SgrfpYq_k9
            Source: CasPol.exe, 00000009.00000003.78492247430.0000000000E25000.00000004.00000001.sdmpString found in binary or memory: https://eruweq.bl.files.1drv.com/y4mWNDnZaG2b1DpDDUBUp81suowzh6ionkEHYNmviteBVtV4mchwDB8E2o0H7JDLVEW
            Source: CasPol.exe, 00000009.00000002.82849325177.000000001DD1B000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/
            Source: CasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com//
            Source: CasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
            Source: CasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/v104
            Source: CasPol.exe, 00000009.00000002.82837183509.0000000000D7B000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
            Source: CasPol.exe, 00000009.00000002.82838279847.0000000000E60000.00000004.00000001.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21121&authkey=APJj8W7
            Source: CasPol.exe, 00000009.00000002.82849325177.000000001DD1B000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
            Source: CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownDNS traffic detected: queries for: onedrive.live.com

            System Summary:

            barindex
            Potential malicious icon foundShow sources
            Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: Justificante de Pago 25112021.pdf _.exe
            Source: Justificante de Pago 25112021.pdf _.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_00401578
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00A83A50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00A84320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00A8C578
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00A8BF4B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00A81120
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00A83708
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00AE0218
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00AE14A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00AE6DD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00B547FC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00B5480C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00B5486F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00B54840
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F60040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F64048
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F68C28
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F62E60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F643AA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F6F128
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F69640
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F6DE48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F7CC6D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F761F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F7A24A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F73330
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1DBF5E48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1DBF470C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1DBF5DCF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1DBF5E47
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1DBF6B3F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00A86280 appears 52 times
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000000.77794519373.0000000000421000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSKIBSBES.exe vs Justificante de Pago 25112021.pdf _.exe
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78524041816.0000000002AA0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSKIBSBES.exeFE2X vs Justificante de Pago 25112021.pdf _.exe
            Source: Justificante de Pago 25112021.pdf _.exeBinary or memory string: OriginalFilenameSKIBSBES.exe vs Justificante de Pago 25112021.pdf _.exe
            Source: Justificante de Pago 25112021.pdf _.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
            Source: Justificante de Pago 25112021.pdf _.exeStatic PE information: invalid certificate
            Source: Justificante de Pago 25112021.pdf _.exeVirustotal: Detection: 35%
            Source: Justificante de Pago 25112021.pdf _.exeReversingLabs: Detection: 17%
            Source: Justificante de Pago 25112021.pdf _.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: unknownProcess created: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe "C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe"
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@4/1@3/1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5588:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5588:304:WilStaging_02
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Justificante de Pago 25112021.pdf _.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\SKIBSBES.pdb source: Justificante de Pago 25112021.pdf _.exe

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000009.00000000.78170639033.0000000000B40000.00000040.00000001.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_00405661 push ebp; ret
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_004066B9 push ds; ret
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_00403193 push ds; retf
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_02A649C0 push 00000011h; iretd
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_02A64E80 push edx; retf
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_02A60C2E push cs; ret
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_02A635A0 push eax; retf
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeCode function: 1_2_02A64D4B push 00000069h; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00F6D7F7 push ebx; iretd
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeFile created: \justificante de pago 25112021.pdf _.exe
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeFile created: \justificante de pago 25112021.pdf _.exe
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525638719.0000000004F60000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSVBVM60.DLL
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525638719.0000000004F60000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82838279847.0000000000E60000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: CasPol.exe, 00000009.00000002.82838279847.0000000000E60000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=HTTPS://ONEDRIVE.LIVE.COM/DOWNLOAD?CID=5A15FDA1AE98540B&RESID=5A15FDA1AE98540B%21121&AUTHKEY=APJJ8W7T3QKLSCW
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2168Thread sleep time: -2767011611056431s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9958
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeSystem information queried: ModuleInformation
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: vmicshutdown
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525638719.0000000004F60000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\msvbvm60.dll
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 00000009.00000002.82837183509.0000000000D7B000.00000004.00000020.sdmp, CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWodc-web-geo.onedrive.akadns.netLMEM@
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525638719.0000000004F60000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82838279847.0000000000E60000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: CasPol.exe, 00000009.00000002.82838279847.0000000000E60000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21121&authkey=APJj8W7T3QklSCw
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: Justificante de Pago 25112021.pdf _.exe, 00000001.00000002.78525710953.0000000005029000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: CasPol.exe, 00000009.00000002.82839934942.00000000029A9000.00000004.00000001.sdmpBinary or memory string: vmicheartbeat

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_00A86E96 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: B40000
            Source: C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe"
            Source: CasPol.exe, 00000009.00000002.82839512733.0000000001550000.00000002.00020000.sdmpBinary or memory string: Program Manager
            Source: CasPol.exe, 00000009.00000002.82839512733.0000000001550000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
            Source: CasPol.exe, 00000009.00000002.82839512733.0000000001550000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: CasPol.exe, 00000009.00000002.82839512733.0000000001550000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8168, type: MEMORYSTR
            Tries to steal Mail credentials (via file / registry access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: Yara matchFile source: 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8168, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8168, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1Process Injection112Disable or Modify Tools1OS Credential Dumping2Security Software Discovery421Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion341Credentials in Registry1Process Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection112Security Account ManagerVirtualization/Sandbox Evasion341SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol111SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsSystem Information Discovery115VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            Justificante de Pago 25112021.pdf _.exe35%VirustotalBrowse
            Justificante de Pago 25112021.pdf _.exe18%ReversingLabsWin32.Trojan.Lazy

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            mails.rpxholding.com0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://x9bGZRuBZN1f4.com0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://smtp.rpxholding.com0%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%Avira URL Cloudsafe
            http://rOTpQz.com0%Avira URL Cloudsafe
            https://api.ipify.org%40%Avira URL Cloudsafe
            https://api.ipify.org%GETMozilla/5.00%Avira URL Cloudsafe
            http://x9bGZRuBZN1f4.comT0%Avira URL Cloudsafe
            http://mails.rpxholding.com0%Avira URL Cloudsafe
            http://x9bGZRuBZN1f4.comt-~l0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            mails.rpxholding.com
            202.158.48.236
            truetrueunknown
            smtp.rpxholding.com
            unknown
            unknowntrue
              unknown
              onedrive.live.com
              unknown
              unknownfalse
                high
                eruweq.bl.files.1drv.com
                unknown
                unknownfalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  https://onedrive.live.com/download?cfalse
                    high

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    https://eruweq.bl.files.1drv.com/=CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmp, CasPol.exe, 00000009.00000003.78500507187.0000000000E25000.00000004.00000001.sdmpfalse
                      high
                      http://x9bGZRuBZN1f4.comCasPol.exe, 00000009.00000002.82850050864.000000001DD87000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.79425673584.000000001CA61000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000002.82850257454.000000001DD9F000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://smtp.rpxholding.comCasPol.exe, 00000009.00000002.82850173263.000000001DD91000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://DynDns.comDynDNSCasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://eruweq.bl.files.1drv.com/yCasPol.exe, 00000009.00000003.78492247430.0000000000E25000.00000004.00000001.sdmpfalse
                        high
                        https://eruweq.bl.files.1drv.com/y4mTi8F-5UT5v8gCCgHyyTjEWDMrhmEHc1_AIKHcGNjnR2bGYZ0rh8uS1SgrfpYq_k9CasPol.exe, 00000009.00000002.82837666825.0000000000DDE000.00000004.00000020.sdmp, CasPol.exe, 00000009.00000003.78499975366.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78500507187.0000000000E25000.00000004.00000001.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haCasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://rOTpQz.comCasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.ipify.org%4CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21121&authkey=APJj8W7CasPol.exe, 00000009.00000002.82838279847.0000000000E60000.00000004.00000001.sdmpfalse
                            high
                            https://support.google.com/chrome/?p=plugin_flashCasPol.exe, 00000009.00000002.82849325177.000000001DD1B000.00000004.00000001.sdmpfalse
                              high
                              https://api.ipify.org%GETMozilla/5.0CasPol.exe, 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              https://eruweq.bl.files.1drv.com/y4mWNDnZaG2b1DpDDUBUp81suowzh6ionkEHYNmviteBVtV4mchwDB8E2o0H7JDLVEWCasPol.exe, 00000009.00000003.78492247430.0000000000E25000.00000004.00000001.sdmpfalse
                                high
                                http://x9bGZRuBZN1f4.comTCasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://eruweq.bl.files.1drv.com/CasPol.exe, 00000009.00000003.78499975366.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78500507187.0000000000E25000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78491920063.0000000000DF1000.00000004.00000001.sdmp, CasPol.exe, 00000009.00000003.78492247430.0000000000E25000.00000004.00000001.sdmpfalse
                                  high
                                  http://mails.rpxholding.comCasPol.exe, 00000009.00000002.82850173263.000000001DD91000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://x9bGZRuBZN1f4.comt-~lCasPol.exe, 00000009.00000002.82848837492.000000001DCC1000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  https://onedrive.live.com/CasPol.exe, 00000009.00000002.82837183509.0000000000D7B000.00000004.00000020.sdmpfalse
                                    high

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    202.158.48.236
                                    mails.rpxholding.comIndonesia
                                    4787ASN-CBNPTCyberindoAditamaIDtrue

                                    General Information

                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:528616
                                    Start date:25.11.2021
                                    Start time:15:15:23
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 12m 32s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:Justificante de Pago 25112021.pdf _.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                    Run name:Suspected Instruction Hammering
                                    Number of analysed new started processes analysed:15
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.rans.troj.spyw.evad.winEXE@4/1@3/1
                                    EGA Information:Failed
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 95%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.82.19.171, 20.54.122.82, 13.107.43.13, 13.107.42.12
                                    • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, client.wns.windows.com, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, wdcp.microsoft.com, arc.msn.com, wd-prod-cp.trafficmanager.net, l-0004.dc-msedge.net, ris.api.iris.microsoft.com, wd-prod-cp-eu-north-1-fe.northeurope.cloudapp.azure.com, wdcpalt.microsoft.com, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, odc-bl-files-brs.onedrive.akadns.net, wd-prod-cp-eu-west-2-fe.westeurope.cloudapp.azure.com, img-prod-cms-rt-microsoft-com.akamaized.net, odc-bl-files-geo.onedrive.akadns.net
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    15:18:36API Interceptor2463x Sleep call for process: CasPol.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    No context

                                    Domains

                                    No context

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    ASN-CBNPTCyberindoAditamaIDNQsLN1nOONGet hashmaliciousBrowse
                                    • 175.158.32.249
                                    arm6-20211123-0942Get hashmaliciousBrowse
                                    • 175.158.32.232
                                    z0x3n.armGet hashmaliciousBrowse
                                    • 202.158.26.75
                                    S8G5z3pdHwGet hashmaliciousBrowse
                                    • 202.158.26.71
                                    zm8eqQuciRGet hashmaliciousBrowse
                                    • 202.158.75.29
                                    pandora.arm7Get hashmaliciousBrowse
                                    • 125.208.178.5
                                    ojZRw3eBpNGet hashmaliciousBrowse
                                    • 175.158.32.227
                                    iuSFhE6G0pGet hashmaliciousBrowse
                                    • 202.158.26.64
                                    caDeEx.dllGet hashmaliciousBrowse
                                    • 202.158.125.219
                                    mlyEBX8rO3Get hashmaliciousBrowse
                                    • 202.158.51.10
                                    jCAxP1U1zEGet hashmaliciousBrowse
                                    • 202.158.38.56
                                    DO3yEscfl8Get hashmaliciousBrowse
                                    • 210.210.146.150
                                    395d6gwkWKGet hashmaliciousBrowse
                                    • 202.158.26.85
                                    qiJTsutSGdGet hashmaliciousBrowse
                                    • 202.158.51.26
                                    ZwjGNyv7Zu.exeGet hashmaliciousBrowse
                                    • 103.87.80.66
                                    https://alumni.uigm.ac.id/?path=barry.maxer@us.tel.comGet hashmaliciousBrowse
                                    • 210.210.130.244
                                    http://www.bbva.es.2dfcad10.fruitking.co.th/.bbva320/?=prueba@prueba.es=Get hashmaliciousBrowse
                                    • 202.158.87.107

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    \Device\ConDrv
                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):30
                                    Entropy (8bit):3.964735178725505
                                    Encrypted:false
                                    SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                    MD5:9F754B47B351EF0FC32527B541420595
                                    SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                    SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                    SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: NordVPN directory not found!..

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):6.141971298184264
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.15%
                                    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:Justificante de Pago 25112021.pdf _.exe
                                    File size:148800
                                    MD5:494cd8be1913f9def79b10031587aa8a
                                    SHA1:ff74b67fa7c03d4fb388f49289ff14639656b3d3
                                    SHA256:75934da02313e0d772b4703bfaa3331311fc5a2b981f8ff0e455795bc3448ddb
                                    SHA512:620ac0b14cfac47728cc1761d6cb9a50d45e1c050c96e8cf069cfb2729fdac8e257fcdb07db97c71c536b63646a548d956e9ec4614f703bd7f8b8a6803dea4e4
                                    SSDEEP:1536:q9aYr5MjHE4q7c4BMoDh9t4ooodRRK7bgNmGT4JVom8D/Qy5gy9LE+YJi3hbh:JYCjH7mc4BMtZ742JV4/Qa4J6h
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM..SM..SM...Q..RM...o..UM..ek..RM..RichSM..................PE..L..._.XW.....................0......x.............@........

                                    File Icon

                                    Icon Hash:20047c7c70f0e004

                                    Static PE Info

                                    General

                                    Entrypoint:0x401578
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                    DLL Characteristics:
                                    Time Stamp:0x57589F5F [Wed Jun 8 22:42:39 2016 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:e6bbebdc7c1418bc1bcdb0dc8a54e696

                                    Authenticode Signature

                                    Signature Valid:false
                                    Signature Issuer:E=Beske7@Udtoemtli6.opm, CN=Svrvgtere, OU=faringsa, O=Hepa6, L=MODGAAS, S=Dann4, C=NE
                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                    Error Number:-2146762487
                                    Not Before, Not After
                                    • 24/11/2021 02:02:10 24/11/2022 02:02:10
                                    Subject Chain
                                    • E=Beske7@Udtoemtli6.opm, CN=Svrvgtere, OU=faringsa, O=Hepa6, L=MODGAAS, S=Dann4, C=NE
                                    Version:3
                                    Thumbprint MD5:38CEFA178A560F005C02C0AB1CCD5B2C
                                    Thumbprint SHA-1:6831094E8AE768575C155840ECA02AE1798897CF
                                    Thumbprint SHA-256:0577BE6AC49E2682236F51DB9FD872B71506301CDBE61148CA0A74BBD6E8C4A4
                                    Serial:00

                                    Entrypoint Preview

                                    Instruction
                                    push 0041AC48h
                                    call 00007F1BD44B1BD5h
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    xor byte ptr [eax], al
                                    add byte ptr [eax], al
                                    inc eax
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [ebx+6C541393h], ah
                                    adc byte ptr [edi+40h], ch
                                    mov byte ptr [eax], cl
                                    add eax, EA98183Fh
                                    lock add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add dword ptr [eax], eax
                                    add byte ptr [eax], al
                                    inc ebp
                                    outsb
                                    or eax, 4F52200Ah
                                    dec esp
                                    dec ecx
                                    inc edi
                                    inc ebp
                                    push edx
                                    inc ebp
                                    add byte ptr [edx+2Eh], al
                                    push esp
                                    js 00007F1BD44B1C57h
                                    inc edx
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    dec esp
                                    xor dword ptr [eax], eax
                                    sbb ebp, edi
                                    push edx
                                    push esp
                                    xchg eax, ebp
                                    retf
                                    push ebp
                                    cmc
                                    inc esi
                                    cmp dword ptr [ebx+ebx*4+4DA7D9D6h], FFFFFFABh
                                    pop esp
                                    jmp 00007F1BD44B1C19h
                                    scasd
                                    pop es
                                    pop ds
                                    mov eax, dword ptr [5832A24Ah]
                                    sbb al, 69h
                                    jnl 00007F1BD44B1BEDh
                                    adc byte ptr [edx], bh
                                    dec edi
                                    lodsd
                                    xor ebx, dword ptr [ecx-48EE309Ah]
                                    or al, 00h
                                    stosb
                                    add byte ptr [eax-2Dh], ah
                                    xchg eax, ebx
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    mov bh, 94h
                                    add dword ptr [eax], eax
                                    inc ebp
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    or dword ptr [eax], eax
                                    dec ebx
                                    inc esp
                                    inc esp
                                    inc ebp
                                    push edx
                                    push ebx
                                    dec esp
                                    dec edi
                                    push esp
                                    add byte ptr [54000701h], cl
                                    jc 00007F1BD44B1C43h
                                    outsb
                                    jnc 00007F1BD44B1C4Fh

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1f8f40x28.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x11ce.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x230580x14e8
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x11600x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x154.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x1ee240x1f000False0.46585969002data6.32767470182IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .data0x200000xc240x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                    .rsrc0x210000x11ce0x2000False0.18798828125data2.35454948934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    CUSTOM0x219100x8beMS Windows icon resource - 1 icon, 32x32EnglishUnited States
                                    RT_ICON0x217e00x130data
                                    RT_ICON0x214f80x2e8data
                                    RT_ICON0x213d00x128GLS_BINARY_LSB_FIRST
                                    RT_GROUP_ICON0x213a00x30data
                                    RT_VERSION0x211a00x200dataChineseTaiwan

                                    Imports

                                    DLLImport
                                    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaStrCat, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaCyStr, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, __vbaI2I4, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarDup, _CIatan, __vbaStrMove, __vbaAryCopy, __vbaCastObj, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                                    Version Infos

                                    DescriptionData
                                    Translation0x0404 0x04b0
                                    InternalNameSKIBSBES
                                    FileVersion1.00
                                    CompanyName
                                    ProductNameTHELS
                                    ProductVersion1.00
                                    OriginalFilenameSKIBSBES.exe

                                    Possible Origin

                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    ChineseTaiwan

                                    Network Behavior

                                    Snort IDS Alerts

                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    11/25/21-15:20:05.071407TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49828587192.168.11.20202.158.48.236

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 25, 2021 15:20:02.209095001 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:02.561590910 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:02.561927080 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:02.921132088 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:02.921575069 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:03.274137020 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:03.274207115 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:03.275841951 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:03.628520012 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:03.629142046 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:04.000830889 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:04.002049923 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:04.356484890 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:04.356745005 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:04.715656996 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:04.715959072 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:05.069144011 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:05.071407080 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:05.071460009 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:05.071472883 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:05.071495056 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:05.423904896 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:05.424016953 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:05.668327093 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:05.671540976 CET49828587192.168.11.20202.158.48.236
                                    Nov 25, 2021 15:20:06.024089098 CET58749828202.158.48.236192.168.11.20
                                    Nov 25, 2021 15:20:06.024425983 CET49828587192.168.11.20202.158.48.236

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 25, 2021 15:18:24.662678003 CET5874853192.168.11.201.1.1.1
                                    Nov 25, 2021 15:18:25.329541922 CET5292853192.168.11.201.1.1.1
                                    Nov 25, 2021 15:20:01.541177988 CET6093453192.168.11.201.1.1.1
                                    Nov 25, 2021 15:20:02.146317959 CET53609341.1.1.1192.168.11.20

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Nov 25, 2021 15:18:24.662678003 CET192.168.11.201.1.1.10xfc6dStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                    Nov 25, 2021 15:18:25.329541922 CET192.168.11.201.1.1.10x6723Standard query (0)eruweq.bl.files.1drv.comA (IP address)IN (0x0001)
                                    Nov 25, 2021 15:20:01.541177988 CET192.168.11.201.1.1.10xcc4fStandard query (0)smtp.rpxholding.comA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Nov 25, 2021 15:18:24.673011065 CET1.1.1.1192.168.11.200xfc6dNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                    Nov 25, 2021 15:18:25.708122015 CET1.1.1.1192.168.11.200x6723No error (0)eruweq.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                    Nov 25, 2021 15:18:25.708122015 CET1.1.1.1192.168.11.200x6723No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                    Nov 25, 2021 15:20:02.146317959 CET1.1.1.1192.168.11.200xcc4fNo error (0)smtp.rpxholding.commails.rpxholding.comCNAME (Canonical name)IN (0x0001)
                                    Nov 25, 2021 15:20:02.146317959 CET1.1.1.1192.168.11.200xcc4fNo error (0)mails.rpxholding.com202.158.48.236A (IP address)IN (0x0001)
                                    Nov 25, 2021 15:20:02.146317959 CET1.1.1.1192.168.11.200xcc4fNo error (0)mails.rpxholding.com202.158.48.237A (IP address)IN (0x0001)

                                    SMTP Packets

                                    TimestampSource PortDest PortSource IPDest IPCommands
                                    Nov 25, 2021 15:20:02.921132088 CET58749828202.158.48.236192.168.11.20220 mails.rpxholding.com - Welcome to Qmail Toaster Ver. 1.3 SMTP Server ESMTP
                                    Nov 25, 2021 15:20:02.921575069 CET49828587192.168.11.20202.158.48.236EHLO 138727
                                    Nov 25, 2021 15:20:03.274207115 CET58749828202.158.48.236192.168.11.20250-mails.rpxholding.com - Welcome to Qmail Toaster Ver. 1.3 SMTP Server
                                    250-STARTTLS
                                    250-PIPELINING
                                    250-8BITMIME
                                    250-SIZE 13631488
                                    250 AUTH LOGIN PLAIN CRAM-MD5
                                    Nov 25, 2021 15:20:03.275841951 CET49828587192.168.11.20202.158.48.236AUTH login ZGhlcmRpYW5hQHJweGhvbGRpbmcuY29t
                                    Nov 25, 2021 15:20:03.628520012 CET58749828202.158.48.236192.168.11.20334 UGFzc3dvcmQ6
                                    Nov 25, 2021 15:20:04.000830889 CET58749828202.158.48.236192.168.11.20235 ok, go ahead (#2.0.0)
                                    Nov 25, 2021 15:20:04.002049923 CET49828587192.168.11.20202.158.48.236MAIL FROM:<dherdiana@rpxholding.com>
                                    Nov 25, 2021 15:20:04.356484890 CET58749828202.158.48.236192.168.11.20250 ok
                                    Nov 25, 2021 15:20:04.356745005 CET49828587192.168.11.20202.158.48.236RCPT TO:<jo.esg2000@gmail.com>
                                    Nov 25, 2021 15:20:04.715656996 CET58749828202.158.48.236192.168.11.20250 ok
                                    Nov 25, 2021 15:20:04.715959072 CET49828587192.168.11.20202.158.48.236DATA
                                    Nov 25, 2021 15:20:05.069144011 CET58749828202.158.48.236192.168.11.20354 go ahead
                                    Nov 25, 2021 15:20:05.071495056 CET49828587192.168.11.20202.158.48.236.
                                    Nov 25, 2021 15:20:05.668327093 CET58749828202.158.48.236192.168.11.20554 Your email is considered spam (16.20 spam-hits)

                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:15:17:14
                                    Start date:25/11/2021
                                    Path:C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe"
                                    Imagebase:0x400000
                                    File size:148800 bytes
                                    MD5 hash:494CD8BE1913F9DEF79B10031587AA8A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Visual Basic
                                    Reputation:low

                                    General

                                    Start time:15:17:52
                                    Start date:25/11/2021
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Justificante de Pago 25112021.pdf _.exe"
                                    Imagebase:0x760000
                                    File size:108664 bytes
                                    MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.82848425704.000000001DC71000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000009.00000000.78170639033.0000000000B40000.00000040.00000001.sdmp, Author: Joe Security
                                    Reputation:moderate

                                    General

                                    Start time:15:17:52
                                    Start date:25/11/2021
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7e0000000
                                    File size:875008 bytes
                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    Disassembly

                                    Code Analysis

                                    Reset < >