Loading ...

Play interactive tourEdit tour

Windows Analysis Report sKxsGhU1Wg

Overview

General Information

Sample Name:sKxsGhU1Wg (renamed file extension from none to exe)
Analysis ID:532181
MD5:99bdb5995c8dd619a3ec2b799d1cf868
SHA1:7eb9e30ba8572f07a1e88972ad8f14954e84eb39
SHA256:c6f93eb69924750adbe61115b2d6a200d534e783c6bd4ca0e2c0cd2969e9469e
Tags:32exe
Infos:

Most interesting Screenshot:

Detection

GuLoader AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
GuLoader behavior detected
Yara detected GuLoader
Hides threads from debuggers
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • sKxsGhU1Wg.exe (PID: 5356 cmdline: "C:\Users\user\Desktop\sKxsGhU1Wg.exe" MD5: 99BDB5995C8DD619A3EC2B799D1CF868)
    • Acly3.exe (PID: 6320 cmdline: C:\Users\user\AppData\Local\Temp\Acly3.exe MD5: E32061DA9B34B82E0AB5D0E53CAF5A09)
      • CasPol.exe (PID: 7052 cmdline: C:\Users\user\AppData\Local\Temp\Acly3.exe MD5: F866FC1C2E928779C7119353C3091F0C)
        • conhost.exe (PID: 7084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • misv.exe (PID: 2060 cmdline: "C:\Users\user\AppData\Roaming\misv.exe" MD5: 1DA682EC8DCBC375B6E76660EF46D3FD)
          • misv.exe (PID: 5952 cmdline: C:\Users\user\AppData\Local\Temp\misv.exe MD5: 267CE829152E1E6B2493EE80291C3E6D)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://onedrive.live.com/download?cid=5A15FDA1AE9"}

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "dherdiana@rpxholding.comdha10apasmtp.rpxholding.comjo.esg2000@gmail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.532731101.0000000003EC0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000007.00000000.422174914.0000000001100000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000011.00000002.571997631.0000000003680000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 2 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000007.00000000.422174914.0000000001100000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?cid=5A15FDA1AE9"}
            Source: CasPol.exe.7052.7.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "dherdiana@rpxholding.comdha10apasmtp.rpxholding.comjo.esg2000@gmail.com"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: sKxsGhU1Wg.exeVirustotal: Detection: 10%Perma Link
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\misv.exeJoe Sandbox ML: detected
            Source: sKxsGhU1Wg.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: sKxsGhU1Wg.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\misv.pdb source: misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Acly3.pdb source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, Acly3.exe.0.dr
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_0040290B FindFirstFileW,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_0040290B FindFirstFileW,

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://onedrive.live.com/download?cid=5A15FDA1AE9
            Source: CasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmp, CasPol.exe, 00000007.00000003.518887334.0000000001667000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: sKxsGhU1Wg.exe, misv.exe.7.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: CasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpString found in binary or memory: http://rOTpQz.com
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: http://s.symcd.com06
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: CasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr, Acly3.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpString found in binary or memory: https://eruitg.bl.files.1drv.com/
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpString found in binary or memory: https://eruitg.bl.files.1drv.com/J8
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmp, CasPol.exe, 00000007.00000003.518887334.0000000001667000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.569873651.000000000164C000.00000004.00000020.sdmpString found in binary or memory: https://eruitg.bl.files.1drv.com/y4mHkTfggODxx7RkoqQxmNWfCL9FqVrcaBSQyvxAjjL4nb6ixOwtQYT-CR8mlHIv8F6
            Source: CasPol.exe, 00000007.00000003.520013739.00000000016A6000.00000004.00000001.sdmpString found in binary or memory: https://eruitg.bl.files.1drv.com/y4mmHvF7gtDYcEKVAssw8HHYEmYy3e8Ia5MiUMo-LLWA4ncs-iDGRsmtfbC3LjnmU1r
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpString found in binary or memory: https://fspzka.bl.files.1drv.com/
            Source: CasPol.exe, 00000007.00000003.525455431.000000001E051000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmp, CasPol.exe, 00000007.00000003.525432805.00000000016DC000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.569866465.0000000001646000.00000004.00000020.sdmpString found in binary or memory: https://fspzka.bl.files.1drv.com/y4m1xaMmJywZq6SCR6mVqa7Op5my9_PY7iegM-lArgf5nc3THKAdgguhWrxWSKxFgJ3
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmp, CasPol.exe, 00000007.00000003.526535753.000000001E055000.00000004.00000001.sdmpString found in binary or memory: https://fspzka.bl.files.1drv.com/y4mOjkceJ6izWrzWM13rG3hQXo0-P1_gDe3S_t4ZWc__sfMR4hK-pncdB-od0qFCPrP
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
            Source: CasPol.exe, 00000007.00000002.569760850.00000000015E7000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/_
            Source: CasPol.exe, 00000007.00000002.569845526.0000000001632000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21129&authkey=AC3Dy6X
            Source: CasPol.exe, 00000007.00000002.569845526.0000000001632000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21130&authkey=AF6g200
            Source: CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/ve.live.com/Q7
            Source: CasPol.exe, 00000007.00000002.569760850.00000000015E7000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/w
            Source: CasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownDNS traffic detected: queries for: onedrive.live.com
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
            Source: sKxsGhU1Wg.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_0040755C
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_00406D85
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_00401724
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_01114840
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_1E383D2C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_1E384800
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_1E3854F2
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_0040755C
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_00406D85
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_00401724
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_0369405C
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_0368CC33
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_03694AA2
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_0368C781
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_0368CC33 NtAllocateVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess Stats: CPU usage > 98%
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305130181.0000000000415000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameAcly3.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDIN
            Source: sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameAcly3.exePADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDIN
            Source: Acly3.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: misv.exe.16.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: sKxsGhU1Wg.exeVirustotal: Detection: 10%
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeFile read: C:\Users\user\Desktop\sKxsGhU1Wg.exeJump to behavior
            Source: sKxsGhU1Wg.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\AppData\Local\Temp\misv.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: unknownProcess created: C:\Users\user\Desktop\sKxsGhU1Wg.exe "C:\Users\user\Desktop\sKxsGhU1Wg.exe"
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeProcess created: C:\Users\user\AppData\Local\Temp\Acly3.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Users\user\AppData\Roaming\misv.exe "C:\Users\user\AppData\Roaming\misv.exe"
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess created: C:\Users\user\AppData\Local\Temp\misv.exe C:\Users\user\AppData\Local\Temp\misv.exe
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeProcess created: C:\Users\user\AppData\Local\Temp\Acly3.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Users\user\AppData\Roaming\misv.exe "C:\Users\user\AppData\Roaming\misv.exe"
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess created: C:\Users\user\AppData\Local\Temp\misv.exe C:\Users\user\AppData\Local\Temp\misv.exe
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Roaming\misv.exeJump to behavior
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeFile created: C:\Users\user\AppData\Local\Temp\nsw3128.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@10/3@3/0
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_004021AA CoCreateInstance,
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7084:120:WilError_01
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: sKxsGhU1Wg.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\misv.pdb source: misv.exe, 00000010.00000002.531379693.0000000000425000.00000004.00020000.sdmp, misv.exe, 00000010.00000002.531332116.000000000040F000.00000004.00020000.sdmp, misv.exe.16.dr
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Acly3.pdb source: sKxsGhU1Wg.exe, 00000000.00000002.305120971.000000000040D000.00000004.00020000.sdmp, sKxsGhU1Wg.exe, 00000000.00000002.305143425.0000000000427000.00000004.00020000.sdmp, Acly3.exe.0.dr

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000001.00000002.532731101.0000000003EC0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.422174914.0000000001100000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.571997631.0000000003680000.00000040.00000001.sdmp, type: MEMORY
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC5FFE push ecx; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC5FA4 push ecx; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC2B82 push ebx; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC5F76 push ecx; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC372A push ecx; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC371C push ecx; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC1EE0 push edi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC1EC8 push edi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC1ED4 push edi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC1EA8 push edi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC1E70 push edi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC1A32 push 00000001h; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC5E1C pushad ; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC5DE9 pushad ; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC41E0 push ss; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC5DBF pushad ; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC3948 push eax; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC3954 push eax; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC2D25 push 00000023h; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC393C push eax; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC3908 push eax; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC58E0 pushad ; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC58C8 pushad ; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC38CA push eax; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC58D4 pushad ; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC40A0 push esi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC58A0 pushad ; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC588E pushad ; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC4094 push esi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC4061 push esi; iretd
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 1_2_03EC600C push ecx; iretd
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeFile created: C:\Users\user\AppData\Local\Temp\Acly3.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Roaming\misv.exeJump to dropped file
            Source: C:\Users\user\AppData\Roaming\misv.exeFile created: C:\Users\user\AppData\Local\Temp\misv.exeJump to dropped file
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect Any.runShow sources
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: Acly3.exe, 00000001.00000002.532851672.0000000003F90000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSVBVM60.DLL
            Source: Acly3.exe, 00000001.00000002.532851672.0000000003F90000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 6928Thread sleep time: -8301034833169293s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_03691740 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 1216
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 1569
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_0040290B FindFirstFileW,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 16_2_0040290B FindFirstFileW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeSystem information queried: ModuleInformation
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: vmicshutdown
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: Acly3.exe, 00000001.00000002.532851672.0000000003F90000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\msvbvm60.dll
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: CasPol.exe, 00000007.00000002.569873651.000000000164C000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW3
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: vmicvss
            Source: misv.exe, 00000010.00000002.531478160.0000000000708000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:5
            Source: CasPol.exe, 00000007.00000002.569873651.000000000164C000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: CasPol.exe, 00000007.00000002.569760850.00000000015E7000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW@Ge
            Source: Acly3.exe, 00000001.00000002.532851672.0000000003F90000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: Acly3.exe, 00000001.00000002.532954808.00000000060FA000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: CasPol.exe, 00000007.00000002.570333429.0000000002FCA000.00000004.00000001.sdmpBinary or memory string: vmicheartbeat

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_03691740 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_0369004F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_03690DC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_0368C4AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 17_2_0369405C RtlAddVectoredExceptionHandler,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 1100000
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Users\user\AppData\Roaming\misv.exe "C:\Users\user\AppData\Roaming\misv.exe"
            Source: CasPol.exe, 00000007.00000002.570069368.0000000001A70000.00000002.00020000.sdmp, misv.exe, 00000011.00000002.571883853.00000000021A0000.00000002.00020000.sdmpBinary or memory string: Program Manager
            Source: CasPol.exe, 00000007.00000002.570069368.0000000001A70000.00000002.00020000.sdmp, misv.exe, 00000011.00000002.571883853.00000000021A0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
            Source: CasPol.exe, 00000007.00000002.570069368.0000000001A70000.00000002.00020000.sdmp, misv.exe, 00000011.00000002.571883853.00000000021A0000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: CasPol.exe, 00000007.00000002.570069368.0000000001A70000.00000002.00020000.sdmp, misv.exe, 00000011.00000002.571883853.00000000021A0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\sKxsGhU1Wg.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7052, type: MEMORYSTR
            GuLoader behavior detectedShow sources
            Source: Initial fileSignature Results: GuLoader behavior
            Source: Yara matchFile source: 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7052, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7052, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211Path InterceptionAccess Token Manipulation1Masquerading1OS Credential DumpingSecurity Software Discovery421Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion331Security Account ManagerVirtualization/Sandbox Evasion331SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsFile and Directory Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery116Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 532181 Sample: sKxsGhU1Wg Startdate: 01/12/2021 Architecture: WINDOWS Score: 100 48 Found malware configuration 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 GuLoader behavior detected 2->52 54 4 other signatures 2->54 9 sKxsGhU1Wg.exe 9 2->9         started        process3 file4 32 C:\Users\user\AppData\Local\Temp\Acly3.exe, PE32 9->32 dropped 12 Acly3.exe 9->12         started        process5 signatures6 58 Writes to foreign memory regions 12->58 60 Tries to detect Any.run 12->60 62 Hides threads from debuggers 12->62 15 CasPol.exe 13 12->15         started        process7 dnsIp8 34 onedrive.live.com 15->34 36 fspzka.bl.files.1drv.com 15->36 38 2 other IPs or domains 15->38 28 C:\Users\user\AppData\Roaming\misv.exe, PE32 15->28 dropped 40 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->40 42 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->42 44 Tries to detect Any.run 15->44 46 Hides threads from debuggers 15->46 20 misv.exe 9 15->20         started        24 conhost.exe 15->24         started        file9 signatures10 process11 file12 30 C:\Users\user\AppData\Local\Temp\misv.exe, PE32 20->30 dropped 56 Machine Learning detection for dropped file 20->56 26 misv.exe 20->26         started        signatures13 process14

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            sKxsGhU1Wg.exe11%VirustotalBrowse

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\misv.exe100%Joe Sandbox ML

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://rOTpQz.com0%Avira URL Cloudsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            onedrive.live.com
            unknown
            unknownfalse
              high
              eruitg.bl.files.1drv.com
              unknown
              unknownfalse
                high
                fspzka.bl.files.1drv.com
                unknown
                unknownfalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  https://onedrive.live.com/download?cid=5A15FDA1AE9false
                    high

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    https://fspzka.bl.files.1drv.com/CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpfalse
                      high
                      http://127.0.0.1:HTTP/1.1CasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSCasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://eruitg.bl.files.1drv.com/J8CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpfalse
                        high
                        https://eruitg.bl.files.1drv.com/y4mmHvF7gtDYcEKVAssw8HHYEmYy3e8Ia5MiUMo-LLWA4ncs-iDGRsmtfbC3LjnmU1rCasPol.exe, 00000007.00000003.520013739.00000000016A6000.00000004.00000001.sdmpfalse
                          high
                          https://fspzka.bl.files.1drv.com/y4mOjkceJ6izWrzWM13rG3hQXo0-P1_gDe3S_t4ZWc__sfMR4hK-pncdB-od0qFCPrPCasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmp, CasPol.exe, 00000007.00000003.526535753.000000001E055000.00000004.00000001.sdmpfalse
                            high
                            https://onedrive.live.com/ve.live.com/Q7CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haCasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://rOTpQz.comCasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.org%GETMozilla/5.0CasPol.exe, 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              low
                              https://eruitg.bl.files.1drv.com/y4mHkTfggODxx7RkoqQxmNWfCL9FqVrcaBSQyvxAjjL4nb6ixOwtQYT-CR8mlHIv8F6CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmp, CasPol.exe, 00000007.00000003.518887334.0000000001667000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.569873651.000000000164C000.00000004.00000020.sdmpfalse
                                high
                                http://nsis.sf.net/NSIS_ErrorErrorsKxsGhU1Wg.exe, misv.exe.7.drfalse
                                  high
                                  https://onedrive.live.com/_CasPol.exe, 00000007.00000002.569760850.00000000015E7000.00000004.00000020.sdmpfalse
                                    high
                                    https://eruitg.bl.files.1drv.com/CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpfalse
                                      high
                                      https://fspzka.bl.files.1drv.com/y4m1xaMmJywZq6SCR6mVqa7Op5my9_PY7iegM-lArgf5nc3THKAdgguhWrxWSKxFgJ3CasPol.exe, 00000007.00000003.525455431.000000001E051000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmp, CasPol.exe, 00000007.00000003.525432805.00000000016DC000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.569866465.0000000001646000.00000004.00000020.sdmpfalse
                                        high
                                        https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21129&authkey=AC3Dy6XCasPol.exe, 00000007.00000002.569845526.0000000001632000.00000004.00000020.sdmpfalse
                                          high
                                          https://onedrive.live.com/CasPol.exe, 00000007.00000002.569911797.0000000001667000.00000004.00000020.sdmpfalse
                                            high
                                            https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21130&authkey=AF6g200CasPol.exe, 00000007.00000002.569845526.0000000001632000.00000004.00000020.sdmpfalse
                                              high
                                              https://onedrive.live.com/wCasPol.exe, 00000007.00000002.569760850.00000000015E7000.00000004.00000020.sdmpfalse
                                                high

                                                Contacted IPs

                                                No contacted IP infos

                                                General Information

                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:532181
                                                Start date:01.12.2021
                                                Start time:20:08:17
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 8m 36s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:sKxsGhU1Wg (renamed file extension from none to exe)
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:21
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@10/3@3/0
                                                EGA Information:Failed
                                                HDC Information:
                                                • Successful, ratio: 100% (good quality ratio 97.1%)
                                                • Quality average: 84.4%
                                                • Quality standard deviation: 23.8%
                                                HCA Information:
                                                • Successful, ratio: 71%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                • Excluded IPs from analysis (whitelisted): 13.107.42.13, 13.107.43.12
                                                • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, fs.microsoft.com, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, l-0003.dc-msedge.net, arc.msn.com, ris.api.iris.microsoft.com, l-0004.l-msedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, odc-bl-files-brs.onedrive.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, odc-bl-files-geo.onedrive.akadns.net
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                20:11:23API Interceptor14x Sleep call for process: CasPol.exe modified

                                                Joe Sandbox View / Context

                                                IPs

                                                No context

                                                Domains

                                                No context

                                                ASN

                                                No context

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                Process:C:\Users\user\Desktop\sKxsGhU1Wg.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):21304624
                                                Entropy (8bit):0.09518636040127255
                                                Encrypted:false
                                                SSDEEP:1536:j30RIkuZxe033g6Oixa+IC8KNXA/wMy2dWVu2h55nw6+717EQZ4yr3hShX:j30qHZxT3gsxaZmNXYy7zysx
                                                MD5:E32061DA9B34B82E0AB5D0E53CAF5A09
                                                SHA1:5AABAD649F6C4B826C30BDF8152E6F8D33CB8133
                                                SHA-256:7C9AEB4763912BE27C0B5CFE843642E4424902DD2EEFB1AD2DF6092EBF10A468
                                                SHA-512:EBF93E81A0AB530EA19131F490A2423E017384357731FBE5CAC4D60876C5B535E371BB9443D62AEA8F41D732079EAB2A6EDD4335EDEAAD086EED2410D5914F54
                                                Malicious:true
                                                Reputation:low
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM.SM.SM..Q..RM..o.UM.ek.RM.RichSM.................PE..L....#L......................B.....$........ ....@...........................E......QE.....................................t...(....0....B.........P.E.....................................................0... ....................................text...$........................... ..`.data...p.... ....... ..............@....rsrc.....B..0....B..0..............@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Temp\misv.exe
                                                Process:C:\Users\user\AppData\Roaming\misv.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):21214512
                                                Entropy (8bit):0.09651890759201205
                                                Encrypted:false
                                                SSDEEP:1536:eMFtMi1UWzCVv7k95bpw45zcJHJEWR4kpDatDwlvpa7WA/xJ2gaQsv6hWfI3hR2S:1jMCUWUv7k95Vw4pupzRrNAFI+2S
                                                MD5:267CE829152E1E6B2493EE80291C3E6D
                                                SHA1:814FEDAD9318740DC21569DA4B900AC9A2CE1270
                                                SHA-256:25526139AACB45F3F8C4F5A6623CA50635163E882F922B908F5A3BF3A94D42EE
                                                SHA-512:3CF20247D421E04D6D154B7C5F8B31943A4DA6FF7EF677A9DD290AF745AD89F802209D6FFD4C573B02186CEDDCB73784E772FA9599A6C88CD2D05C0656A0050B
                                                Malicious:false
                                                Reputation:low
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM.SM.SM..Q..RM..o.UM.ek.RM.RichSM.................PE..L..../.I......................A.....$........ ....@...........................C......C.........................................(....0..plA.........P.C.....................................................0... ....................................text............................... ..`.data...p.... ....... ..............@....rsrc...plA..0...pA..0..............@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Roaming\misv.exe
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):135018
                                                Entropy (8bit):7.060957913639306
                                                Encrypted:false
                                                SSDEEP:3072:gbG7N2kDTHUpou4ubvh1q2SRdteVQNOqeOEgyVlzba:gbE/HUjva2udnNOqbByVlPa
                                                MD5:1DA682EC8DCBC375B6E76660EF46D3FD
                                                SHA1:B7DA4D771226B5A4F045B0D8A263451612EE3303
                                                SHA-256:6D624544826CC99182030BB50757944FEE3734EA01E8C37A77A22214BFF4B9DF
                                                SHA-512:2077475610EAA19020D7AFA36896B3E995D66651F4D0E8B4EB8523D64EA8C4B5C48778081182C033FD3C330A253EF8FA34E935BAD4EF7947CD17EE09B126AA4F
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                Reputation:low
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j..........-5............@.......................................@..........................................................................................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data...............................@....ndata...`...`...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.073841941088541
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:sKxsGhU1Wg.exe
                                                File size:131595
                                                MD5:99bdb5995c8dd619a3ec2b799d1cf868
                                                SHA1:7eb9e30ba8572f07a1e88972ad8f14954e84eb39
                                                SHA256:c6f93eb69924750adbe61115b2d6a200d534e783c6bd4ca0e2c0cd2969e9469e
                                                SHA512:8a2817d4cd4d9584c0c723ca96550b65f530c6de6193b977239ce3c90c8eb0e3942b7ecf2ac3f12c730ae053c3a88993d54bfed16fee6b2cc5aa5083105c52d6
                                                SSDEEP:3072:gbG7N2kDTHUpou4ub+HbksLwq6cttYgSj+LaQitS42:gbE/HUjwkshtOlj+LaQitE
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........

                                                File Icon

                                                Icon Hash:b2a88c96b2ca6a72

                                                Static PE Info

                                                General

                                                Entrypoint:0x40352d
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6

                                                Entrypoint Preview

                                                Instruction
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 000003F4h
                                                push ebx
                                                push esi
                                                push edi
                                                push 00000020h
                                                pop edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [ebp-14h], ebx
                                                mov dword ptr [ebp-04h], 0040A2E0h
                                                mov dword ptr [ebp-10h], ebx
                                                call dword ptr [004080CCh]
                                                mov esi, dword ptr [004080D0h]
                                                lea eax, dword ptr [ebp-00000140h]
                                                push eax
                                                mov dword ptr [ebp-0000012Ch], ebx
                                                mov dword ptr [ebp-2Ch], ebx
                                                mov dword ptr [ebp-28h], ebx
                                                mov dword ptr [ebp-00000140h], 0000011Ch
                                                call esi
                                                test eax, eax
                                                jne 00007F090CAF81DAh
                                                lea eax, dword ptr [ebp-00000140h]
                                                mov dword ptr [ebp-00000140h], 00000114h
                                                push eax
                                                call esi
                                                mov ax, word ptr [ebp-0000012Ch]
                                                mov ecx, dword ptr [ebp-00000112h]
                                                sub ax, 00000053h
                                                add ecx, FFFFFFD0h
                                                neg ax
                                                sbb eax, eax
                                                mov byte ptr [ebp-26h], 00000004h
                                                not eax
                                                and eax, ecx
                                                mov word ptr [ebp-2Ch], ax
                                                cmp dword ptr [ebp-0000013Ch], 0Ah
                                                jnc 00007F090CAF81AAh
                                                and word ptr [ebp-00000132h], 0000h
                                                mov eax, dword ptr [ebp-00000134h]
                                                movzx ecx, byte ptr [ebp-00000138h]
                                                mov dword ptr [00434FB8h], eax
                                                xor eax, eax
                                                mov ah, byte ptr [ebp-0000013Ch]
                                                movzx eax, ax
                                                or eax, ecx
                                                xor ecx, ecx
                                                mov ch, byte ptr [ebp-2Ch]
                                                movzx ecx, cx
                                                shl eax, 10h
                                                or eax, ecx

                                                Rich Headers

                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000x11e0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                .ndata0x360000x160000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x4c0000x11e00x1200False0.368489583333data4.48173978815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_BITMAP0x4c2680x368dataEnglishUnited States
                                                RT_ICON0x4c5d00x2e8dataEnglishUnited States
                                                RT_DIALOG0x4c8b80x144dataEnglishUnited States
                                                RT_DIALOG0x4ca000x13cdataEnglishUnited States
                                                RT_DIALOG0x4cb400x100dataEnglishUnited States
                                                RT_DIALOG0x4cc400x11cdataEnglishUnited States
                                                RT_DIALOG0x4cd600xc4dataEnglishUnited States
                                                RT_DIALOG0x4ce280x60dataEnglishUnited States
                                                RT_GROUP_ICON0x4ce880x14dataEnglishUnited States
                                                RT_MANIFEST0x4cea00x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                Imports

                                                DLLImport
                                                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW

                                                Possible Origin

                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States

                                                Network Behavior

                                                Network Port Distribution

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 1, 2021 20:11:01.993771076 CET5902653192.168.2.38.8.8.8
                                                Dec 1, 2021 20:11:02.738807917 CET4957253192.168.2.38.8.8.8
                                                Dec 1, 2021 20:11:05.786591053 CET5213053192.168.2.38.8.8.8

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Dec 1, 2021 20:11:01.993771076 CET192.168.2.38.8.8.80x2e78Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                                Dec 1, 2021 20:11:02.738807917 CET192.168.2.38.8.8.80x3585Standard query (0)eruitg.bl.files.1drv.comA (IP address)IN (0x0001)
                                                Dec 1, 2021 20:11:05.786591053 CET192.168.2.38.8.8.80x9dc6Standard query (0)fspzka.bl.files.1drv.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Dec 1, 2021 20:11:02.021389008 CET8.8.8.8192.168.2.30x2e78No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                Dec 1, 2021 20:11:02.851330042 CET8.8.8.8192.168.2.30x3585No error (0)eruitg.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                                Dec 1, 2021 20:11:02.851330042 CET8.8.8.8192.168.2.30x3585No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                Dec 1, 2021 20:11:05.829888105 CET8.8.8.8192.168.2.30x9dc6No error (0)fspzka.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                                Dec 1, 2021 20:11:05.829888105 CET8.8.8.8192.168.2.30x9dc6No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:20:09:19
                                                Start date:01/12/2021
                                                Path:C:\Users\user\Desktop\sKxsGhU1Wg.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\sKxsGhU1Wg.exe"
                                                Imagebase:0x400000
                                                File size:131595 bytes
                                                MD5 hash:99BDB5995C8DD619A3EC2B799D1CF868
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                General

                                                Start time:20:09:21
                                                Start date:01/12/2021
                                                Path:C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                Imagebase:0x400000
                                                File size:21304624 bytes
                                                MD5 hash:E32061DA9B34B82E0AB5D0E53CAF5A09
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Visual Basic
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.532731101.0000000003EC0000.00000040.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                General

                                                Start time:20:10:15
                                                Start date:01/12/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                Imagebase:0xcf0000
                                                File size:107624 bytes
                                                MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000000.422174914.0000000001100000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.574115115.000000001E4A1000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:moderate

                                                General

                                                Start time:20:10:17
                                                Start date:01/12/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7f20f0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:11:03
                                                Start date:01/12/2021
                                                Path:C:\Users\user\AppData\Roaming\misv.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\misv.exe"
                                                Imagebase:0x400000
                                                File size:135018 bytes
                                                MD5 hash:1DA682EC8DCBC375B6E76660EF46D3FD
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                Reputation:low

                                                General

                                                Start time:20:11:07
                                                Start date:01/12/2021
                                                Path:C:\Users\user\AppData\Local\Temp\misv.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Local\Temp\misv.exe
                                                Imagebase:0x400000
                                                File size:21214512 bytes
                                                MD5 hash:267CE829152E1E6B2493EE80291C3E6D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:Visual Basic
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000011.00000002.571997631.0000000003680000.00000040.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >