Loading ...

Play interactive tourEdit tour

Windows Analysis Report Purchase Order No. XIV21623..exe

Overview

General Information

Sample Name:Purchase Order No. XIV21623..exe
Analysis ID:532633
MD5:5e5c83d04f20a03826b8cd80d2c4a0b5
SHA1:840248f524917151d9b44dda32cbb32ab1fd7d80
SHA256:62c4b3a0c365726907f0ac94621c85f5c52056eb94653b151144cc841502e916
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Yara detected AgentTesla
Initial sample is a PE file and has a suspicious name
Executable has a suspicious name (potential lure to open the executable)
Machine Learning detection for sample
.NET source code contains potential unpacker
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Sigma detected: Suspicious aspnet_compiler.exe Execution
Detected potential crypto function
Creates a process in suspended mode (likely to inject code)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

Process Tree

  • System is w10x64
  • Purchase Order No. XIV21623..exe (PID: 496 cmdline: "C:\Users\user\Desktop\Purchase Order No. XIV21623..exe" MD5: 5E5C83D04F20A03826B8CD80D2C4A0B5)
    • aspnet_compiler.exe (PID: 1552 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe MD5: 17CC69238395DF61AAF483BCEF02E7C9)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "anjay@peoplesource.in", "Password": "Admin@12345", "Host": "mail.peoplesource.in"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      Process Memory Space: Purchase Order No. XIV21623..exe PID: 496JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.Purchase Order No. XIV21623..exe.13454660.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0.2.Purchase Order No. XIV21623..exe.13454660.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            0.2.Purchase Order No. XIV21623..exe.13454660.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Purchase Order No. XIV21623..exe.13454660.3.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Suspicious aspnet_compiler.exe ExecutionShow sources
                Source: Process startedAuthor: frack113: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order No. XIV21623..exe" , ParentImage: C:\Users\user\Desktop\Purchase Order No. XIV21623..exe, ParentProcessId: 496, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 1552

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Antivirus / Scanner detection for submitted sampleShow sources
                Source: Purchase Order No. XIV21623..exeAvira: detected
                Found malware configurationShow sources
                Source: 0.2.Purchase Order No. XIV21623..exe.13454660.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "anjay@peoplesource.in", "Password": "Admin@12345", "Host": "mail.peoplesource.in"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: Purchase Order No. XIV21623..exeReversingLabs: Detection: 35%
                Machine Learning detection for sampleShow sources
                Source: Purchase Order No. XIV21623..exeJoe Sandbox ML: detected
                Source: 0.0.Purchase Order No. XIV21623..exe.810000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen

                Compliance:

                barindex
                Detected unpacking (overwrites its own PE header)Show sources
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeUnpacked PE file: 0.2.Purchase Order No. XIV21623..exe.810000.0.unpack
                Source: Purchase Order No. XIV21623..exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: Purchase Order No. XIV21623..exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: ?????????????c.pdb source: Purchase Order No. XIV21623..exe, 00000000.00000002.248225365.0000000000ED0000.00000004.00020000.sdmp
                Source: Purchase Order No. XIV21623..exe, 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip

                System Summary:

                barindex
                Initial sample is a PE file and has a suspicious nameShow sources
                Source: initial sampleStatic PE information: Filename: Purchase Order No. XIV21623..exe
                Executable has a suspicious name (potential lure to open the executable)Show sources
                Source: Purchase Order No. XIV21623..exeStatic file information: Suspicious name
                Source: Purchase Order No. XIV21623..exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                Source: Purchase Order No. XIV21623..exe, 00000000.00000002.247943652.0000000000850000.00000002.00020000.sdmpBinary or memory string: OriginalFilenametaker.exeP vs Purchase Order No. XIV21623..exe
                Source: Purchase Order No. XIV21623..exe, 00000000.00000002.248225365.0000000000ED0000.00000004.00020000.sdmpBinary or memory string: OriginalFilename8l vs Purchase Order No. XIV21623..exe
                Source: Purchase Order No. XIV21623..exe, 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmpBinary or memory string: OriginalFilenametnCUHxlBGCKFCsHpcbSvLqLWGfKD.exe4 vs Purchase Order No. XIV21623..exe
                Source: Purchase Order No. XIV21623..exe, 00000000.00000002.248059960.0000000000D19000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order No. XIV21623..exe
                Source: Purchase Order No. XIV21623..exeBinary or memory string: OriginalFilenametaker.exeP vs Purchase Order No. XIV21623..exe
                Source: Purchase Order No. XIV21623..exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeCode function: 0_2_00007FFA1D941D0D0_2_00007FFA1D941D0D
                Source: Purchase Order No. XIV21623..exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: Purchase Order No. XIV21623..exeReversingLabs: Detection: 35%
                Source: Purchase Order No. XIV21623..exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order No. XIV21623..exe "C:\Users\user\Desktop\Purchase Order No. XIV21623..exe"
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Purchase Order No. XIV21623..exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Purchase Order No. XIV21623..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Purchase Order No. XIV21623..exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: ?????????????c.pdb source: Purchase Order No. XIV21623..exe, 00000000.00000002.248225365.0000000000ED0000.00000004.00020000.sdmp

                Data Obfuscation:

                barindex
                Detected unpacking (overwrites its own PE header)Show sources
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeUnpacked PE file: 0.2.Purchase Order No. XIV21623..exe.810000.0.unpack
                .NET source code contains potential unpackerShow sources
                Source: Purchase Order No. XIV21623..exe, c5b09415cd7b0c75252f1d37810bcc5d0.cs.Net Code: c08af4a61b44020d61ee70e0d21a00651 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.2.Purchase Order No. XIV21623..exe.810000.0.unpack, c5b09415cd7b0c75252f1d37810bcc5d0.cs.Net Code: c08af4a61b44020d61ee70e0d21a00651 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.Purchase Order No. XIV21623..exe.810000.0.unpack, c5b09415cd7b0c75252f1d37810bcc5d0.cs.Net Code: c08af4a61b44020d61ee70e0d21a00651 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeCode function: 0_2_00007FFA1D94518E push edx; iretd 0_2_00007FFA1D945191
                Source: initial sampleStatic PE information: section name: .text entropy: 7.96708162926
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exe TID: 2072Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Purchase Order No. XIV21623..exe, 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmpBinary or memory string: !`0QYYJVMcIQ
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeQueries volume information: C:\Users\user\Desktop\Purchase Order No. XIV21623..exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Purchase Order No. XIV21623..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 0.2.Purchase Order No. XIV21623..exe.13454660.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Purchase Order No. XIV21623..exe.13454660.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Purchase Order No. XIV21623..exe PID: 496, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 0.2.Purchase Order No. XIV21623..exe.13454660.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Purchase Order No. XIV21623..exe.13454660.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Purchase Order No. XIV21623..exe PID: 496, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing23NTDSSystem Information Discovery12Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection11LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                Purchase Order No. XIV21623..exe36%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                Purchase Order No. XIV21623..exe100%AviraTR/Dropper.MSIL.Gen
                Purchase Order No. XIV21623..exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.Purchase Order No. XIV21623..exe.810000.0.unpack100%AviraHEUR/AGEN.1105850Download File
                0.0.Purchase Order No. XIV21623..exe.810000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPurchase Order No. XIV21623..exe, 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown

                Contacted IPs

                No contacted IP infos

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:532633
                Start date:02.12.2021
                Start time:15:18:35
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 3m 49s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:Purchase Order No. XIV21623..exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:3
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@3/1@0/0
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 2.2% (good quality ratio 1.3%)
                • Quality average: 40.6%
                • Quality standard deviation: 37.2%
                HCA Information:
                • Successful, ratio: 87%
                • Number of executed functions: 2
                • Number of non-executed functions: 1
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe
                • Stop behavior analysis, all processes terminated
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): svchost.exe
                • Excluded IPs from analysis (whitelisted): 23.35.236.56
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, e1723.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net
                • VT rate limit hit for: /opt/package/joesandbox/database/analysis/532633/sample/Purchase Order No. XIV21623..exe

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Purchase Order No. XIV21623..exe.log
                Process:C:\Users\user\Desktop\Purchase Order No. XIV21623..exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):654
                Entropy (8bit):5.374391981354885
                Encrypted:false
                SSDEEP:12:Q3La/KDLI4MWuPTxAIOKbbDLI4MWuPOKN08JOKhap+92n4MNQpN9tv:ML9E4KrgKDE4KGKN08AKh6+84xpNT
                MD5:C8A62E39DE7A3F805D39384E8BABB1E0
                SHA1:B32B1257401F17A2D1D5D3CC1D8C1E072E3FEE31
                SHA-256:A7BC127854C5327ABD50C86000BF10586B556A5E085BB23523B07A15DD4C5383
                SHA-512:7DB2825131F5CDA6AF33A179D9F7CD0A206FF34AE50D6E66DE9E99BE2CD1CB985B88C00F0EDE72BBC4467E7E42B5DC6132403AA2EC1A0A7A6D11766C438B10C3
                Malicious:true
                Reputation:moderate, very likely benign file
                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.8879021889341425
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:Purchase Order No. XIV21623..exe
                File size:274944
                MD5:5e5c83d04f20a03826b8cd80d2c4a0b5
                SHA1:840248f524917151d9b44dda32cbb32ab1fd7d80
                SHA256:62c4b3a0c365726907f0ac94621c85f5c52056eb94653b151144cc841502e916
                SHA512:3fa38c0033df01c29b376086df84fed1aa0047c7ce2de2ae2f7465c1ce12211613a7ed78e21a9f6810ebfe35acf713d1749c5f1f2e34f282f063399af0feee73
                SSDEEP:6144:Reot2u5F/vFkZuMEvcumRVTSyGR12K8vuHKzoJ8L:0Hu5FXFkZuMEUuwV7HvuHQ
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a............................j.... ........@.. ....................................@................................

                File Icon

                Icon Hash:a289a9ed6da39200

                Static PE Info

                General

                Entrypoint:0x43c86a
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x61A89780 [Thu Dec 2 09:53:04 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:v4.0.30319
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                Entrypoint Preview

                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8100x57.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x8360.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3e0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x3a8700x3aa00False0.96924556903data7.96708162926IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .reloc0x3e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                .rsrc0x400000x83600x8400False0.587831439394data6.84237661239IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x401c00x468GLS_BINARY_LSB_FIRST
                RT_ICON0x406280x1128data
                RT_ICON0x417500x2668data
                RT_ICON0x43db80x40a2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                RT_GROUP_ICON0x47e5c0x3edata
                RT_VERSION0x47e9c0x2d8data
                RT_MANIFEST0x481740x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                Imports

                DLLImport
                mscoree.dll_CorExeMain

                Version Infos

                DescriptionData
                Translation0x0000 0x04b0
                LegalCopyrightCopyright 2021
                Assembly Version0.0.0.0
                InternalNametaker.exe
                FileVersion0.0.0.0
                ProductNameDevil_private_cryptterr
                ProductVersion0.0.0.0
                FileDescriptionDevil_private_cryptterr
                OriginalFilenametaker.exe

                Network Behavior

                No network behavior found

                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:15:19:32
                Start date:02/12/2021
                Path:C:\Users\user\Desktop\Purchase Order No. XIV21623..exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\Purchase Order No. XIV21623..exe"
                Imagebase:0x810000
                File size:274944 bytes
                MD5 hash:5E5C83D04F20A03826B8CD80D2C4A0B5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.250031063.0000000013189000.00000004.00000001.sdmp, Author: Joe Security
                Reputation:low

                General

                Start time:15:19:34
                Start date:02/12/2021
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                Imagebase:0x40000
                File size:55400 bytes
                MD5 hash:17CC69238395DF61AAF483BCEF02E7C9
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                Disassembly

                Code Analysis

                Reset < >

                  Executed Functions

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.251266383.00007FFA1D940000.00000040.00000001.sdmp, Offset: 00007FFA1D940000, based on PE: false
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 4e19677211b6ed290276b815af7ac018c0f7fca2383f861916b79a61984f6b21
                  • Instruction ID: 2a4bf24be2e7ec13f05664b81176c02b4d9dfdcc9433b50eac36acb58f5961b0
                  • Opcode Fuzzy Hash: 4e19677211b6ed290276b815af7ac018c0f7fca2383f861916b79a61984f6b21
                  • Instruction Fuzzy Hash: C6028130918A8D8FEBB4DF18C855BE97BE1FF59310F00412AD84ED7692DB74A685CB81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.251266383.00007FFA1D940000.00000040.00000001.sdmp, Offset: 00007FFA1D940000, based on PE: false
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 33fb74a15cb2942ad41db89acb9e3080589cafc156ff464abab34ce6d99a2734
                  • Instruction ID: 258287b760b708365402abdad62cd844cde96335120ea4051638e9f6617a9f70
                  • Opcode Fuzzy Hash: 33fb74a15cb2942ad41db89acb9e3080589cafc156ff464abab34ce6d99a2734
                  • Instruction Fuzzy Hash: 1D511870918A5D8FDB94DF58C845BEABBB1FB6A310F10926AD04DE3251DB74A885CF80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Non-executed Functions

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.251266383.00007FFA1D940000.00000040.00000001.sdmp, Offset: 00007FFA1D940000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID: q7y
                  • API String ID: 0-1838881769
                  • Opcode ID: d8841ce56a8a377cde041ea7b120e4804d031a3ea47d7983ed1aa8732ece6815
                  • Instruction ID: 8e6ff5b728c9f844755d490a27f2081d7d1b274da29053e563b3f9fe708d341d
                  • Opcode Fuzzy Hash: d8841ce56a8a377cde041ea7b120e4804d031a3ea47d7983ed1aa8732ece6815
                  • Instruction Fuzzy Hash: 7CA1C4B6A2CA9D8FE794DB58D8567E97FE0FF5A320F41427AD00DD3792DB2418058B80
                  Uniqueness

                  Uniqueness Score: -1.00%