Loading ...

Play interactive tourEdit tour

Windows Analysis Report Shipping Document BL Copy.exe

Overview

General Information

Sample Name:Shipping Document BL Copy.exe
Analysis ID:532661
MD5:a11bddf84a3f7098a1200185d96d2ddf
SHA1:c9efd834b1b17605802da4ecd61bac2354e980e7
SHA256:32669b1a78afc2cc0017cef36385f47d9c851fabf6aead330bee2330a493a92c
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • tKZVPq.exe (PID: 6556 cmdline: "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe" MD5: A11BDDF84A3F7098A1200185D96D2DDF)
    • tKZVPq.exe (PID: 6240 cmdline: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe MD5: A11BDDF84A3F7098A1200185D96D2DDF)
  • tKZVPq.exe (PID: 6832 cmdline: "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe" MD5: A11BDDF84A3F7098A1200185D96D2DDF)
    • tKZVPq.exe (PID: 2256 cmdline: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe MD5: A11BDDF84A3F7098A1200185D96D2DDF)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "finance@demo.jeninfo.com", "Password": "%e&qapQ3oNkx", "Host": "mail.demo.jeninfo.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          0000000C.00000000.395789636.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 55 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.Shipping Document BL Copy.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.Shipping Document BL Copy.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                12.0.tKZVPq.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  12.0.tKZVPq.exe.400000.10.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    10.2.tKZVPq.exe.4159aa0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 58 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 2.0.Shipping Document BL Copy.exe.400000.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "finance@demo.jeninfo.com", "Password": "%e&qapQ3oNkx", "Host": "mail.demo.jeninfo.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Shipping Document BL Copy.exeReversingLabs: Detection: 13%
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeReversingLabs: Detection: 13%
                      Source: 2.0.Shipping Document BL Copy.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.Shipping Document BL Copy.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 12.0.tKZVPq.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.tKZVPq.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                      Source: 12.0.tKZVPq.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                      Source: 12.0.tKZVPq.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                      Source: 12.0.tKZVPq.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.tKZVPq.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.tKZVPq.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.tKZVPq.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.Shipping Document BL Copy.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.Shipping Document BL Copy.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.Shipping Document BL Copy.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.tKZVPq.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.Shipping Document BL Copy.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                      Source: 12.2.tKZVPq.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.2.tKZVPq.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 12.0.tKZVPq.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: Shipping Document BL Copy.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Shipping Document BL Copy.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49802 -> 103.195.185.115:587
                      Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                      Source: Joe Sandbox ViewIP Address: 103.195.185.115 103.195.185.115
                      Source: global trafficTCP traffic: 192.168.2.3:49802 -> 103.195.185.115:587
                      Source: global trafficTCP traffic: 192.168.2.3:49802 -> 103.195.185.115:587
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, tKZVPq.exe, 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, tKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: tKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpString found in binary or memory: http://BmacPT.com
                      Source: tKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.562294886.000000000308B000.00000004.00000001.sdmpString found in binary or memory: http://demo.jeninfo.com
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.562294886.000000000308B000.00000004.00000001.sdmpString found in binary or memory: http://mail.demo.jeninfo.com
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.562294886.000000000308B000.00000004.00000001.sdmp, Shipping Document BL Copy.exe, 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmpString found in binary or memory: http://qXonUXHmaco.net
                      Source: Shipping Document BL Copy.exe, 00000000.00000002.302606282.0000000004249000.00000004.00000001.sdmp, Shipping Document BL Copy.exe, 00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmp, Shipping Document BL Copy.exe, 00000002.00000002.557996705.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 00000008.00000002.382185263.00000000037F9000.00000004.00000001.sdmp, tKZVPq.exe, 00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 00000009.00000000.376744796.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.404660056.0000000003FA9000.00000004.00000001.sdmp, tKZVPq.exe, 0000000C.00000000.395789636.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 0000000C.00000000.393587407.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, tKZVPq.exe, 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, tKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: mail.demo.jeninfo.com

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: Shipping Document BL Copy.exe
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.0.Shipping Document BL Copy.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bC54C654Du002d1F0Bu002d446Bu002dAC5Du002d65F74970AA45u007d/B2F568B2u002d973Eu002d45AEu002dA54Fu002d2E80459E8E64.csLarge array initialization: .cctor: array initializer size 11940
                      Source: 2.2.Shipping Document BL Copy.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bC54C654Du002d1F0Bu002d446Bu002dAC5Du002d65F74970AA45u007d/B2F568B2u002d973Eu002d45AEu002dA54Fu002d2E80459E8E64.csLarge array initialization: .cctor: array initializer size 11940
                      Source: 2.0.Shipping Document BL Copy.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bC54C654Du002d1F0Bu002d446Bu002dAC5Du002d65F74970AA45u007d/B2F568B2u002d973Eu002d45AEu002dA54Fu002d2E80459E8E64.csLarge array initialization: .cctor: array initializer size 11940
                      Source: 2.0.Shipping Document BL Copy.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bC54C654Du002d1F0Bu002d446Bu002dAC5Du002d65F74970AA45u007d/B2F568B2u002d973Eu002d45AEu002dA54Fu002d2E80459E8E64.csLarge array initialization: .cctor: array initializer size 11940
                      Source: Shipping Document BL Copy.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_017CF770
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_017CE778
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_017CE76A
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_017CBDC4
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_00E42050
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_01121140
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_011211E2
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_01129BF0
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_01125D38
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_01126578
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_01126479
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_02B747A0
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_02B7477F
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_02B7D820
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_052B7100
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_052BBC68
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_00822050
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0263E76B
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0263E778
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0263BDC4
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_00392050
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_011947A0
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_01193CCC
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_01194750
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_01194790
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_01195490
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_007B2050
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_013BE778
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_013BE76A
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_013BBDC4
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_05484F50
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_0548C1C8
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_0548C1D8
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_05484F41
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_0548384F
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_00B62050
                      Source: Shipping Document BL Copy.exeBinary or memory string: OriginalFilename vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exe, 00000000.00000002.302606282.0000000004249000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFyKnTqyFcfLHrgHTrTGrmHWnBuhJPDMQ.exe4 vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exe, 00000000.00000002.301906183.0000000003241000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exe, 00000000.00000002.301906183.0000000003241000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFyKnTqyFcfLHrgHTrTGrmHWnBuhJPDMQ.exe4 vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exe, 00000000.00000002.305927868.00000000064D0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exeBinary or memory string: OriginalFilename vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exe, 00000002.00000003.511539186.00000000065B2000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBadImageFormatExcepti.exeB vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.557996705.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameFyKnTqyFcfLHrgHTrTGrmHWnBuhJPDMQ.exe4 vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.559130828.0000000000CF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exeBinary or memory string: OriginalFilenameBadImageFormatExcepti.exeB vs Shipping Document BL Copy.exe
                      Source: Shipping Document BL Copy.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: tKZVPq.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Shipping Document BL Copy.exeReversingLabs: Detection: 13%
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile read: C:\Users\user\Desktop\Shipping Document BL Copy.exeJump to behavior
                      Source: Shipping Document BL Copy.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\Shipping Document BL Copy.exe "C:\Users\user\Desktop\Shipping Document BL Copy.exe"
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess created: C:\Users\user\Desktop\Shipping Document BL Copy.exe C:\Users\user\Desktop\Shipping Document BL Copy.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess created: C:\Users\user\Desktop\Shipping Document BL Copy.exe C:\Users\user\Desktop\Shipping Document BL Copy.exe
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Shipping Document BL Copy.exe.logJump to behavior
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@9/5@2/2
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: 2.0.Shipping Document BL Copy.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.0.Shipping Document BL Copy.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.Shipping Document BL Copy.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.Shipping Document BL Copy.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.0.Shipping Document BL Copy.exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.0.Shipping Document BL Copy.exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Shipping Document BL Copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Shipping Document BL Copy.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Data Obfuscation:

                      barindex
                      .NET source code contains potential unpackerShow sources
                      Source: Shipping Document BL Copy.exe, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.0.Shipping Document BL Copy.exe.e40000.0.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.2.Shipping Document BL Copy.exe.e40000.0.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: tKZVPq.exe.2.dr, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.0.Shipping Document BL Copy.exe.820000.7.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.0.Shipping Document BL Copy.exe.820000.9.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.0.Shipping Document BL Copy.exe.820000.2.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.0.Shipping Document BL Copy.exe.820000.3.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 2.0.Shipping Document BL Copy.exe.820000.1.unpack, Views/MainForm.cs.Net Code: CF234052 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_00E442DB push ss; iretd
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_00E442B1 push cs; iretd
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_00E44287 push cs; iretd
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_00E4424F push es; iretd
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 0_2_017CE768 pushfd ; ret
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_00824287 push cs; iretd
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_008242B1 push cs; iretd
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_008242DB push ss; iretd
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_0082424F push es; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0039424F push es; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_003942B1 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_00394287 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_003942DB push ss; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0263421B push ebp; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_02634219 push esi; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_026342D0 push edi; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_02634123 push edx; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_02634120 push edx; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_02634127 push edx; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_026341E1 push ebp; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0263E768 pushfd ; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0263B109 pushfd ; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 8_2_0263B1AF pushfd ; ret
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_007B424F push es; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_007B42DB push ss; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_007B42B1 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 9_2_007B4287 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_00B642B1 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_00B64287 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_00B642DB push ss; iretd
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_00B6424F push es; iretd
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85459508247
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.85459508247
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run tKZVPqJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run tKZVPqJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe:Zone.Identifier read attributes | delete
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.32613ec.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.2fc13d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.28113d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.381266500.00000000027F1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.301906183.0000000003241000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.381339607.000000000282D000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.400597276.0000000002FDD000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.301950347.000000000327D000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Shipping Document BL Copy.exe PID: 7068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6556, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6832, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Shipping Document BL Copy.exe, 00000000.00000002.301906183.0000000003241000.00000004.00000001.sdmp, Shipping Document BL Copy.exe, 00000000.00000002.301950347.000000000327D000.00000004.00000001.sdmp, tKZVPq.exe, 00000008.00000002.381266500.00000000027F1000.00000004.00000001.sdmp, tKZVPq.exe, 00000008.00000002.381339607.000000000282D000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.400597276.0000000002FDD000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: Shipping Document BL Copy.exe, 00000000.00000002.301906183.0000000003241000.00000004.00000001.sdmp, Shipping Document BL Copy.exe, 00000000.00000002.301950347.000000000327D000.00000004.00000001.sdmp, tKZVPq.exe, 00000008.00000002.381266500.00000000027F1000.00000004.00000001.sdmp, tKZVPq.exe, 00000008.00000002.381339607.000000000282D000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.400597276.0000000002FDD000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exe TID: 7072Thread sleep time: -40901s >= -30000s
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exe TID: 7088Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exe TID: 4884Thread sleep count: 33 > 30
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exe TID: 4884Thread sleep time: -30437127721620741s >= -30000s
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exe TID: 4908Thread sleep count: 2377 > 30
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exe TID: 4908Thread sleep count: 7450 > 30
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 6564Thread sleep time: -40389s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 6288Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 6824Thread sleep time: -40760s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 6812Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 5392Thread sleep time: -19369081277395017s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 5748Thread sleep count: 3219 > 30
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 5748Thread sleep count: 6622 > 30
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWindow / User API: threadDelayed 2377
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWindow / User API: threadDelayed 7450
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWindow / User API: threadDelayed 3219
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWindow / User API: threadDelayed 6622
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeThread delayed: delay time: 40901
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 40389
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 40760
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477
                      Source: tKZVPq.exe, 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                      Source: tKZVPq.exe, 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: tKZVPq.exe, 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: tKZVPq.exe, 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeCode function: 2_2_0112B158 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeProcess created: C:\Users\user\Desktop\Shipping Document BL Copy.exe C:\Users\user\Desktop\Shipping Document BL Copy.exe
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.560894505.0000000001720000.00000002.00020000.sdmp, tKZVPq.exe, 0000000C.00000002.560281432.0000000001900000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.560894505.0000000001720000.00000002.00020000.sdmp, tKZVPq.exe, 0000000C.00000002.560281432.0000000001900000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.560894505.0000000001720000.00000002.00020000.sdmp, tKZVPq.exe, 0000000C.00000002.560281432.0000000001900000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: Shipping Document BL Copy.exe, 00000002.00000002.560894505.0000000001720000.00000002.00020000.sdmp, tKZVPq.exe, 0000000C.00000002.560281432.0000000001900000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Users\user\Desktop\Shipping Document BL Copy.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Users\user\Desktop\Shipping Document BL Copy.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 2.2.Shipping Document BL Copy.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.4159aa0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.418fcc0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39dfcc0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39a9aa0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39dfcc0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39a9aa0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.418fcc0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.43f9aa0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.442fcc0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.442fcc0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.4159aa0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.43f9aa0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.395789636.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.393587407.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.378517305.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.402190166.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.377815268.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.302606282.0000000004249000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.395273418.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.396352645.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.557996705.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.557983586.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.376744796.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.299280557.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.298778595.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.299813727.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.404660056.0000000003FA9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.382185263.00000000037F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Shipping Document BL Copy.exe PID: 7068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Shipping Document BL Copy.exe PID: 7136, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6556, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6240, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6832, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 2256, type: MEMORYSTR
                      Tries to steal Mail credentials (via file / registry access)Show sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\Desktop\Shipping Document BL Copy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: Yara matchFile source: 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Shipping Document BL Copy.exe PID: 7136, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6240, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 2256, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 2.2.Shipping Document BL Copy.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.4159aa0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.418fcc0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39dfcc0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39a9aa0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39dfcc0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.Shipping Document BL Copy.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.tKZVPq.exe.39a9aa0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.418fcc0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.43f9aa0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.442fcc0.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.442fcc0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.4159aa0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Shipping Document BL Copy.exe.43f9aa0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.395789636.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.393587407.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.378517305.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.402190166.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.377815268.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.302606282.0000000004249000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.395273418.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.396352645.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.557996705.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.557983586.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.376744796.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.299280557.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.298778595.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.299813727.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.404660056.0000000003FA9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.382185263.00000000037F9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Shipping Document BL Copy.exe PID: 7068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Shipping Document BL Copy.exe PID: 7136, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6556, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6240, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6832, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 2256, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection12File and Directory Permissions Modification1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Credentials in Registry1Security Software Discovery311Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing13LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 532661 Sample: Shipping Document  BL Copy.exe Startdate: 02/12/2021 Architecture: WINDOWS Score: 100 45 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->45 47 Found malware configuration 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 8 other signatures 2->51 6 Shipping Document  BL Copy.exe 3 2->6         started        9 tKZVPq.exe 3 2->9         started        12 tKZVPq.exe 2 2->12         started        process3 file4 23 C:\...\Shipping Document  BL Copy.exe.log, ASCII 6->23 dropped 14 Shipping Document  BL Copy.exe 2 5 6->14         started        53 Multi AV Scanner detection for dropped file 9->53 55 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 9->55 57 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 9->57 19 tKZVPq.exe 2 9->19         started        21 tKZVPq.exe 2 12->21         started        signatures5 process6 dnsIp7 31 demo.jeninfo.com 103.195.185.115, 49802, 587 PUBLIC-DOMAIN-REGISTRYUS India 14->31 33 mail.demo.jeninfo.com 14->33 35 192.168.2.1 unknown unknown 14->35 25 C:\Users\user\AppData\Roaming\...\tKZVPq.exe, PE32 14->25 dropped 27 C:\Windows\System32\drivers\etc\hosts, ASCII 14->27 dropped 29 C:\Users\user\...\tKZVPq.exe:Zone.Identifier, ASCII 14->29 dropped 37 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->37 39 Tries to steal Mail credentials (via file / registry access) 14->39 41 Tries to harvest and steal ftp login credentials 14->41 43 3 other signatures 14->43 file8 signatures9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Shipping Document BL Copy.exe14%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe14%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.0.Shipping Document BL Copy.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                      2.2.Shipping Document BL Copy.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      12.0.tKZVPq.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.tKZVPq.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                      12.0.tKZVPq.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                      12.0.tKZVPq.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                      12.0.tKZVPq.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.tKZVPq.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.tKZVPq.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.tKZVPq.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.Shipping Document BL Copy.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.Shipping Document BL Copy.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.Shipping Document BL Copy.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.tKZVPq.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.Shipping Document BL Copy.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                      12.2.tKZVPq.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      9.2.tKZVPq.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      12.0.tKZVPq.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://mail.demo.jeninfo.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://BmacPT.com0%Avira URL Cloudsafe
                      http://demo.jeninfo.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://qXonUXHmaco.net0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      demo.jeninfo.com
                      103.195.185.115
                      truetrue
                        unknown
                        mail.demo.jeninfo.com
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1Shipping Document BL Copy.exe, 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, tKZVPq.exe, 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, tKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://DynDns.comDynDNStKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://mail.demo.jeninfo.comShipping Document BL Copy.exe, 00000002.00000002.562294886.000000000308B000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haShipping Document BL Copy.exe, 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, tKZVPq.exe, 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, tKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://BmacPT.comtKZVPq.exe, 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://demo.jeninfo.comShipping Document BL Copy.exe, 00000002.00000002.562294886.000000000308B000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipShipping Document BL Copy.exe, 00000000.00000002.302606282.0000000004249000.00000004.00000001.sdmp, Shipping Document BL Copy.exe, 00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmp, Shipping Document BL Copy.exe, 00000002.00000002.557996705.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 00000008.00000002.382185263.00000000037F9000.00000004.00000001.sdmp, tKZVPq.exe, 00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 00000009.00000000.376744796.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.404660056.0000000003FA9000.00000004.00000001.sdmp, tKZVPq.exe, 0000000C.00000000.395789636.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 0000000C.00000000.393587407.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://qXonUXHmaco.netShipping Document BL Copy.exe, 00000002.00000002.562294886.000000000308B000.00000004.00000001.sdmp, Shipping Document BL Copy.exe, 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          103.195.185.115
                          demo.jeninfo.comIndia
                          394695PUBLIC-DOMAIN-REGISTRYUStrue

                          Private

                          IP
                          192.168.2.1

                          General Information

                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:532661
                          Start date:02.12.2021
                          Start time:15:47:21
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 12m 54s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:Shipping Document BL Copy.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:24
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.adwa.spyw.evad.winEXE@9/5@2/2
                          EGA Information:Failed
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 23.35.237.194, 23.211.6.115
                          • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, arc.msn.com, storeedgefd.xbetservices.akadns.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, displaycatalog.mp.microsoft.com, e16646.dscg.akamaiedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, storeedgefd.dsx.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/532661/sample/Shipping Document BL Copy.exe

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          15:48:20API Interceptor775x Sleep call for process: Shipping Document BL Copy.exe modified
                          15:48:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run tKZVPq C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          15:48:54AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run tKZVPq C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          15:48:57API Interceptor411x Sleep call for process: tKZVPq.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          103.195.185.115http://pimpackaging.com/js/505.htmGet hashmaliciousBrowse
                          • pimpackaging.com/js/favicon.ico
                          14_output76EEB60.exeGet hashmaliciousBrowse
                          • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                          56_outputFAF073F.exeGet hashmaliciousBrowse
                          • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                          1jjjjjj_output513A770.exeGet hashmaliciousBrowse
                          • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                          15rm_outputA1B309F.exeGet hashmaliciousBrowse
                          • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                          http://www.wahathalwancontracting.com/Rechnungen/012019Get hashmaliciousBrowse
                          • www.wahathalwancontracting.com/Rechnungen/012019/

                          Domains

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          PUBLIC-DOMAIN-REGISTRYUSDHL SHIPMENT NOTIFICATION 284748395PD.exeGet hashmaliciousBrowse
                          • 208.91.199.223
                          SHIPPING DOCUMENT & PL.exeGet hashmaliciousBrowse
                          • 103.195.185.115
                          Swift MT103 pdf.exeGet hashmaliciousBrowse
                          • 208.91.199.225
                          Scan096355.exeGet hashmaliciousBrowse
                          • 208.91.199.225
                          yYa94CeATF8h2NA.exeGet hashmaliciousBrowse
                          • 208.91.199.223
                          part-1500645108.xlsbGet hashmaliciousBrowse
                          • 103.76.231.42
                          part-1500645108.xlsbGet hashmaliciousBrowse
                          • 103.76.231.42
                          item-40567503.xlsbGet hashmaliciousBrowse
                          • 162.215.254.201
                          item-40567503.xlsbGet hashmaliciousBrowse
                          • 162.215.254.201
                          PG4636 - Confirmed .xls.exeGet hashmaliciousBrowse
                          • 208.91.198.143
                          item-107262298.xlsbGet hashmaliciousBrowse
                          • 162.215.254.201
                          item-107262298.xlsbGet hashmaliciousBrowse
                          • 162.215.254.201
                          item-1202816963.xlsbGet hashmaliciousBrowse
                          • 162.215.254.201
                          item-1202816963.xlsbGet hashmaliciousBrowse
                          • 162.215.254.201
                          DHL Receipt.htmlGet hashmaliciousBrowse
                          • 199.79.62.126
                          BOQ.exeGet hashmaliciousBrowse
                          • 208.91.199.223
                          RFQ-Spares and tools.exeGet hashmaliciousBrowse
                          • 208.91.198.143
                          box-1688169224.xlsbGet hashmaliciousBrowse
                          • 199.79.62.54
                          box-1689035414.xlsbGet hashmaliciousBrowse
                          • 199.79.62.54
                          box-1688169224.xlsbGet hashmaliciousBrowse
                          • 199.79.62.54

                          JA3 Fingerprints

                          No context

                          Dropped Files

                          No context

                          Created / dropped Files

                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Shipping Document BL Copy.exe.log
                          Process:C:\Users\user\Desktop\Shipping Document BL Copy.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1310
                          Entropy (8bit):5.345651901398759
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE47mE4Ko88:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz6
                          MD5:D918C6A765EDB90D2A227FE23A3FEC98
                          SHA1:8BA802AD8D740F114783F0DADC407CBFD2A209B3
                          SHA-256:AB0E9F716E31502A4C6786575C5E64DFD9D24AF99056BBE2640A2FA322CFF4D6
                          SHA-512:A937ABD8294BB32A612F8B3A376C94111D688379F0A4DB9FAA2FCEB71C25E18D621EEBCFDA5706B71C8473A4F38D8B3C4005D1589B564F9B1C9C441B6D337814
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tKZVPq.exe.log
                          Process:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1310
                          Entropy (8bit):5.345651901398759
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE47mE4Ko88:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz6
                          MD5:D918C6A765EDB90D2A227FE23A3FEC98
                          SHA1:8BA802AD8D740F114783F0DADC407CBFD2A209B3
                          SHA-256:AB0E9F716E31502A4C6786575C5E64DFD9D24AF99056BBE2640A2FA322CFF4D6
                          SHA-512:A937ABD8294BB32A612F8B3A376C94111D688379F0A4DB9FAA2FCEB71C25E18D621EEBCFDA5706B71C8473A4F38D8B3C4005D1589B564F9B1C9C441B6D337814
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                          C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          Process:C:\Users\user\Desktop\Shipping Document BL Copy.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):707584
                          Entropy (8bit):7.845435680671236
                          Encrypted:false
                          SSDEEP:12288:Z2m4hGpdaVDevwfb16bXmCiapN56QM4ig7LDi02xQSeFKGlMMKHbjO/1UbX7X2vZ:ZTuGL6DWO18XmCPzQQQgjf2xVVGCR2+4
                          MD5:A11BDDF84A3F7098A1200185D96D2DDF
                          SHA1:C9EFD834B1B17605802DA4ECD61BAC2354E980E7
                          SHA-256:32669B1A78AFC2CC0017CEF36385F47D9C851FABF6AEAD330BEE2330A493A92C
                          SHA-512:09F50DD907702D9A75A1168D9787F5A3924E55B5D5328E6927C55E5C8573AA0D6635A02FACE68AAE38789D9242125BF69F161457FAEE645898E545885F1B27C1
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 14%
                          Reputation:low
                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.a..............0.................. ........@.. ....................... ............@.................................0...O.......8............................................................................ ............... ..H............text........ ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................d.......H.......p>...F......Z...`....Y...........................................0..7..........=...%....r...p.......%.r...p.%.rE..p.%...(......+..*".(.....*&.(......**..(......*....(......*....(......*....0............d.......{......o.......+..*....0..3.........{....s.......o......(I.....,..rc..psO...z..}....*..0............o......0..o......0..o.....2..o.......+....,..r...pr...ps....z.o.......o....ZX..{...........,..rM..ps....z..{....o.....+_..( .........oL...........,B..{.......s/..
                          C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe:Zone.Identifier
                          Process:C:\Users\user\Desktop\Shipping Document BL Copy.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview: [ZoneTransfer]....ZoneId=0
                          C:\Windows\System32\drivers\etc\hosts
                          Process:C:\Users\user\Desktop\Shipping Document BL Copy.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):835
                          Entropy (8bit):4.694294591169137
                          Encrypted:false
                          SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                          MD5:6EB47C1CF858E25486E42440074917F2
                          SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                          SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                          SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview: # Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1

                          Static File Info

                          General

                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.845435680671236
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:Shipping Document BL Copy.exe
                          File size:707584
                          MD5:a11bddf84a3f7098a1200185d96d2ddf
                          SHA1:c9efd834b1b17605802da4ecd61bac2354e980e7
                          SHA256:32669b1a78afc2cc0017cef36385f47d9c851fabf6aead330bee2330a493a92c
                          SHA512:09f50dd907702d9a75a1168d9787f5a3924e55b5d5328e6927c55e5c8573aa0d6635a02face68aae38789d9242125bf69f161457faee645898e545885f1b27c1
                          SSDEEP:12288:Z2m4hGpdaVDevwfb16bXmCiapN56QM4ig7LDi02xQSeFKGlMMKHbjO/1UbX7X2vZ:ZTuGL6DWO18XmCPzQQQgjf2xVVGCR2+4
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....$.a..............0.................. ........@.. ....................... ............@................................

                          File Icon

                          Icon Hash:00828e8e8686b000

                          Static PE Info

                          General

                          Entrypoint:0x4adf82
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                          Time Stamp:0x61A824F6 [Thu Dec 2 01:44:22 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:v4.0.30319
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                          Entrypoint Preview

                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add al, byte ptr [eax]
                          adc byte ptr [eax], al
                          add byte ptr [eax], al
                          and byte ptr [eax], al
                          add byte ptr [eax+00000018h], al
                          push eax
                          add byte ptr [eax], al
                          add byte ptr [eax], 00000000h
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add dword ptr [eax], eax
                          add dword ptr [eax], eax
                          add byte ptr [eax], al
                          cmp byte ptr [eax], al
                          add byte ptr [eax+00000000h], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add dword ptr [eax], eax
                          add byte ptr [eax], al

                          Data Directories

                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xadf300x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x638.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                          Sections

                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xabf880xac000False0.917020575945data7.85459508247IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          .rsrc0xae0000x6380x800False0.34521484375data3.50668611215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xb00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                          Resources

                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0xae0900x3a8data
                          RT_MANIFEST0xae4480x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                          Imports

                          DLLImport
                          mscoree.dll_CorExeMain

                          Version Infos

                          DescriptionData
                          Translation0x0000 0x04b0
                          LegalCopyrightCopyright Mogens Heller Grabe 2010
                          Assembly Version1.0.0.0
                          InternalNameBadImageFormatExcepti.exe
                          FileVersion1.0.0.0
                          CompanyNameMookid8000
                          LegalTrademarks
                          Comments
                          ProductNameTypedFactoryTjek
                          ProductVersion1.0.0.0
                          FileDescriptionTypedFactoryTjek
                          OriginalFilenameBadImageFormatExcepti.exe

                          Network Behavior

                          Snort IDS Alerts

                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          12/02/21-15:50:09.021241TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49802587192.168.2.3103.195.185.115

                          Network Port Distribution

                          TCP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Dec 2, 2021 15:50:06.008785963 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:06.153987885 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:06.154134989 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:06.927009106 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:06.927447081 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:07.072676897 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:07.074709892 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:07.220199108 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:07.221029043 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:07.406510115 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:08.120759010 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:08.121718884 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:08.266720057 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:08.267219067 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:08.426610947 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:08.427053928 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:08.572117090 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:08.572154999 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:08.642983913 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:09.021240950 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:09.021390915 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:09.024656057 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:09.024741888 CET49802587192.168.2.3103.195.185.115
                          Dec 2, 2021 15:50:09.166224003 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:09.170247078 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:09.170361996 CET58749802103.195.185.115192.168.2.3
                          Dec 2, 2021 15:50:09.220339060 CET49802587192.168.2.3103.195.185.115

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Dec 2, 2021 15:50:05.136945009 CET6082353192.168.2.38.8.8.8
                          Dec 2, 2021 15:50:05.516716003 CET53608238.8.8.8192.168.2.3
                          Dec 2, 2021 15:50:05.860317945 CET5213053192.168.2.38.8.8.8
                          Dec 2, 2021 15:50:05.878249884 CET53521308.8.8.8192.168.2.3

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Dec 2, 2021 15:50:05.136945009 CET192.168.2.38.8.8.80x9f4cStandard query (0)mail.demo.jeninfo.comA (IP address)IN (0x0001)
                          Dec 2, 2021 15:50:05.860317945 CET192.168.2.38.8.8.80x4f4aStandard query (0)mail.demo.jeninfo.comA (IP address)IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Dec 2, 2021 15:50:05.516716003 CET8.8.8.8192.168.2.30x9f4cNo error (0)mail.demo.jeninfo.comdemo.jeninfo.comCNAME (Canonical name)IN (0x0001)
                          Dec 2, 2021 15:50:05.516716003 CET8.8.8.8192.168.2.30x9f4cNo error (0)demo.jeninfo.com103.195.185.115A (IP address)IN (0x0001)
                          Dec 2, 2021 15:50:05.878249884 CET8.8.8.8192.168.2.30x4f4aNo error (0)mail.demo.jeninfo.comdemo.jeninfo.comCNAME (Canonical name)IN (0x0001)
                          Dec 2, 2021 15:50:05.878249884 CET8.8.8.8192.168.2.30x4f4aNo error (0)demo.jeninfo.com103.195.185.115A (IP address)IN (0x0001)

                          SMTP Packets

                          TimestampSource PortDest PortSource IPDest IPCommands
                          Dec 2, 2021 15:50:06.927009106 CET58749802103.195.185.115192.168.2.3220-bh-in-22.webhostbox.net ESMTP Exim 4.94.2 #2 Thu, 02 Dec 2021 14:50:06 +0000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Dec 2, 2021 15:50:06.927447081 CET49802587192.168.2.3103.195.185.115EHLO 035347
                          Dec 2, 2021 15:50:07.072676897 CET58749802103.195.185.115192.168.2.3250-bh-in-22.webhostbox.net Hello 035347 [84.17.52.65]
                          250-SIZE 52428800
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPE_CONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Dec 2, 2021 15:50:07.074709892 CET49802587192.168.2.3103.195.185.115AUTH login ZmluYW5jZUBkZW1vLmplbmluZm8uY29t
                          Dec 2, 2021 15:50:07.220199108 CET58749802103.195.185.115192.168.2.3334 UGFzc3dvcmQ6
                          Dec 2, 2021 15:50:08.120759010 CET58749802103.195.185.115192.168.2.3235 Authentication succeeded
                          Dec 2, 2021 15:50:08.121718884 CET49802587192.168.2.3103.195.185.115MAIL FROM:<finance@demo.jeninfo.com>
                          Dec 2, 2021 15:50:08.266720057 CET58749802103.195.185.115192.168.2.3250 OK
                          Dec 2, 2021 15:50:08.267219067 CET49802587192.168.2.3103.195.185.115RCPT TO:<finance@demo.jeninfo.com>
                          Dec 2, 2021 15:50:08.426610947 CET58749802103.195.185.115192.168.2.3250 Accepted
                          Dec 2, 2021 15:50:08.427053928 CET49802587192.168.2.3103.195.185.115DATA
                          Dec 2, 2021 15:50:08.572154999 CET58749802103.195.185.115192.168.2.3354 Enter message, ending with "." on a line by itself
                          Dec 2, 2021 15:50:09.024741888 CET49802587192.168.2.3103.195.185.115.
                          Dec 2, 2021 15:50:09.170361996 CET58749802103.195.185.115192.168.2.3250 OK id=1msnPU-001ojR-GJ

                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:15:48:19
                          Start date:02/12/2021
                          Path:C:\Users\user\Desktop\Shipping Document BL Copy.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Shipping Document BL Copy.exe"
                          Imagebase:0xe40000
                          File size:707584 bytes
                          MD5 hash:A11BDDF84A3F7098A1200185D96D2DDF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.302606282.0000000004249000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.302606282.0000000004249000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.301906183.0000000003241000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.301950347.000000000327D000.00000004.00000001.sdmp, Author: Joe Security
                          Reputation:low

                          General

                          Start time:15:48:21
                          Start date:02/12/2021
                          Path:C:\Users\user\Desktop\Shipping Document BL Copy.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\Shipping Document BL Copy.exe
                          Imagebase:0x820000
                          File size:707584 bytes
                          MD5 hash:A11BDDF84A3F7098A1200185D96D2DDF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.298383826.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.557996705.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.557996705.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.299280557.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.299280557.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.298778595.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.298778595.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.299813727.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.299813727.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.561404484.0000000002D21000.00000004.00000001.sdmp, Author: Joe Security
                          Reputation:low

                          General

                          Start time:15:48:54
                          Start date:02/12/2021
                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                          Imagebase:0x390000
                          File size:707584 bytes
                          MD5 hash:A11BDDF84A3F7098A1200185D96D2DDF
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.381266500.00000000027F1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.381339607.000000000282D000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.382185263.00000000037F9000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.382185263.00000000037F9000.00000004.00000001.sdmp, Author: Joe Security
                          Antivirus matches:
                          • Detection: 14%, ReversingLabs
                          Reputation:low

                          General

                          Start time:15:48:58
                          Start date:02/12/2021
                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          Imagebase:0x7b0000
                          File size:707584 bytes
                          MD5 hash:A11BDDF84A3F7098A1200185D96D2DDF
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.377270702.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.378517305.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.378517305.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.402190166.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000002.402190166.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.377815268.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.377815268.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.376744796.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.376744796.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.404740810.0000000002AD1000.00000004.00000001.sdmp, Author: Joe Security
                          Reputation:low

                          General

                          Start time:15:49:02
                          Start date:02/12/2021
                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                          Imagebase:0xb60000
                          File size:707584 bytes
                          MD5 hash:A11BDDF84A3F7098A1200185D96D2DDF
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.400436439.0000000002FA1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.404660056.0000000003FA9000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000A.00000002.404660056.0000000003FA9000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.400597276.0000000002FDD000.00000004.00000001.sdmp, Author: Joe Security
                          Reputation:low

                          General

                          Start time:15:49:06
                          Start date:02/12/2021
                          Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                          Imagebase:0xb70000
                          File size:707584 bytes
                          MD5 hash:A11BDDF84A3F7098A1200185D96D2DDF
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.395789636.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.395789636.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.393587407.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.393587407.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.560842841.0000000002FB1000.00000004.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.395273418.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.395273418.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.396352645.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.396352645.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.557983586.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000002.557983586.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                          Reputation:low

                          Disassembly

                          Code Analysis

                          Reset < >