Loading ...

Play interactive tourEdit tour

Windows Analysis Report O53TFikPkp

Overview

General Information

Sample Name:O53TFikPkp (renamed file extension from none to exe)
Analysis ID:552998
MD5:be56d049ee926fbccec623695d12a5c6
SHA1:1fa7ea2d0e348b7e1d79a7e6426e6f10376238e4
SHA256:626213dec6f5f7c552974fc4d9fe954cb70b94f03588aa4550cd545789034167
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Multi AV Scanner detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Moves itself to temp directory
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • O53TFikPkp.exe (PID: 6712 cmdline: "C:\Users\user\Desktop\O53TFikPkp.exe" MD5: BE56D049EE926FBCCEC623695D12A5C6)
    • O53TFikPkp.exe (PID: 6892 cmdline: "C:\Users\user\Desktop\O53TFikPkp.exe" MD5: BE56D049EE926FBCCEC623695D12A5C6)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "mailfilter247@yandex.com", "Password": "daddyhandsome@1234", "Host": "smtp.yandex.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000002.923015296.0000000000549000.00000004.00000020.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 18 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.O53TFikPkp.exe.25e0000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.O53TFikPkp.exe.25e0000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.1.O53TFikPkp.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.1.O53TFikPkp.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    2.0.O53TFikPkp.exe.415058.9.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 53 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 2.0.O53TFikPkp.exe.400000.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "mailfilter247@yandex.com", "Password": "daddyhandsome@1234", "Host": "smtp.yandex.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: O53TFikPkp.exeVirustotal: Detection: 51%Perma Link
                      Source: O53TFikPkp.exeReversingLabs: Detection: 53%
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Local\Temp\nsr28EF.tmp\eqbaypenr.dllReversingLabs: Detection: 40%
                      Machine Learning detection for sampleShow sources
                      Source: O53TFikPkp.exeJoe Sandbox ML: detected
                      Source: 2.0.O53TFikPkp.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.O53TFikPkp.exe.4970000.5.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.O53TFikPkp.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.O53TFikPkp.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.O53TFikPkp.exe.400000.5.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.1.O53TFikPkp.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.O53TFikPkp.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.O53TFikPkp.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.O53TFikPkp.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.O53TFikPkp.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8

                      Compliance:

                      barindex
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeUnpacked PE file: 2.2.O53TFikPkp.exe.4970000.5.unpack
                      Source: O53TFikPkp.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: Binary string: wntdll.pdbUGP source: O53TFikPkp.exe, 00000001.00000003.660492913.00000000032F0000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000001.00000003.658708230.0000000003160000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: O53TFikPkp.exe, 00000001.00000003.660492913.00000000032F0000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000001.00000003.658708230.0000000003160000.00000004.00000001.sdmp
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00405D7C FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00402630 FindFirstFileA,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00404A29 FindFirstFileExW,
                      Source: Joe Sandbox ViewIP Address: 77.88.21.158 77.88.21.158
                      Source: global trafficTCP traffic: 192.168.2.4:49803 -> 77.88.21.158:587
                      Source: global trafficTCP traffic: 192.168.2.4:49803 -> 77.88.21.158:587
                      Source: O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpString found in binary or memory: http://UbQjJM.com
                      Source: O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum.pl/ca.crl0h
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://crls.yandex.net/certum/ycasha2.crl0-
                      Source: O53TFikPkp.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                      Source: O53TFikPkp.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ca.cer09
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ctnca.cer09
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ycasha2.cer0
                      Source: O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://smtp.yandex.com
                      Source: O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certu
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certum.com0.
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certum.com01
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://www.certum.pl/CPS0
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://yandex.crl.certum.pl/ycasha2.crl0q
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: http://yandex.ocsp-responder.com03
                      Source: O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: O53TFikPkp.exe, 00000002.00000002.924375629.00000000029A5000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924396051.00000000029AD000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.888941433.0000000005151000.00000004.00000001.sdmpString found in binary or memory: https://bbTPeNUsMvT4JktW3MN.com
                      Source: O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpString found in binary or memory: https://www.certum.pl/CPS0
                      Source: O53TFikPkp.exe, O53TFikPkp.exe, 00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.923912577.00000000025E0000.00000004.00020000.sdmp, O53TFikPkp.exe, 00000002.00000002.922818649.0000000000400000.00000040.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924840687.0000000004972000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: smtp.yandex.com
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.2.O53TFikPkp.exe.4970000.5.unpack, u003cPrivateImplementationDetailsu003eu007b2A2AA767u002d7D90u002d43DEu002dACF4u002d870AEC55D6EBu007d/u003631AE4A7u002dA1C6u002d4422u002d8C60u002d7447CA07753B.csLarge array initialization: .cctor: array initializer size 11961
                      Source: O53TFikPkp.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_0040604C
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00404772
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0040A2A5
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00464840
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00464C78
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00461DD8
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0046EA60
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0046AC20
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00466CB0
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0046C75F
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0046C7C0
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00716138
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0071F138
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00715B01
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0071D858
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_008CE200
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_008C04F6
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_008C8990
                      Source: O53TFikPkp.exe, 00000001.00000003.658828325.0000000003276000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000001.00000003.662197259.000000000340F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000001.00000002.667167111.00000000022B0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameGHVfffxRlZmplFWkRRUtYKzwxFM.exe4 vs O53TFikPkp.exe
                      Source: O53TFikPkp.exeBinary or memory string: OriginalFilename vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameGHVfffxRlZmplFWkRRUtYKzwxFM.exe4 vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameGHVfffxRlZmplFWkRRUtYKzwxFM.exe4 vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000002.00000002.923912577.00000000025E0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameGHVfffxRlZmplFWkRRUtYKzwxFM.exe4 vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000002.00000002.922818649.0000000000400000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameGHVfffxRlZmplFWkRRUtYKzwxFM.exe4 vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000002.00000002.924840687.0000000004972000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameGHVfffxRlZmplFWkRRUtYKzwxFM.exe4 vs O53TFikPkp.exe
                      Source: O53TFikPkp.exe, 00000002.00000002.922757502.0000000000199000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs O53TFikPkp.exe
                      Source: O53TFikPkp.exeVirustotal: Detection: 51%
                      Source: O53TFikPkp.exeReversingLabs: Detection: 53%
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile read: C:\Users\user\Desktop\O53TFikPkp.exeJump to behavior
                      Source: O53TFikPkp.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\O53TFikPkp.exe "C:\Users\user\Desktop\O53TFikPkp.exe"
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess created: C:\Users\user\Desktop\O53TFikPkp.exe "C:\Users\user\Desktop\O53TFikPkp.exe"
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess created: C:\Users\user\Desktop\O53TFikPkp.exe "C:\Users\user\Desktop\O53TFikPkp.exe"
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile created: C:\Users\user\AppData\Roaming\yf3kqygs.3juJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile created: C:\Users\user\AppData\Local\Temp\nsr28ED.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/5@4/1
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00402012 CoCreateInstance,MultiByteToWideChar,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
                      Source: 2.2.O53TFikPkp.exe.4970000.5.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.O53TFikPkp.exe.4970000.5.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: Binary string: wntdll.pdbUGP source: O53TFikPkp.exe, 00000001.00000003.660492913.00000000032F0000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000001.00000003.658708230.0000000003160000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: O53TFikPkp.exe, 00000001.00000003.660492913.00000000032F0000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000001.00000003.658708230.0000000003160000.00000004.00000001.sdmp

                      Data Obfuscation:

                      barindex
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeUnpacked PE file: 2.2.O53TFikPkp.exe.4970000.5.unpack
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_72B21000 push eax; ret
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00401F16 push ecx; ret
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00469848 push 000045CAh; retf 0045h
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0071B557 push edi; retn 0000h
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0071D2E9 push eax; retf 0071h
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0071D3A0 push eax; retf 0071h
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile created: C:\Users\user\AppData\Local\Temp\nsr28EF.tmp\eqbaypenr.dllJump to dropped file

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Moves itself to temp directoryShow sources
                      Source: c:\users\user\desktop\o53tfikpkp.exeFile moved: C:\Users\user\AppData\Local\Temp\tmpG377.tmpJump to behavior
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\O53TFikPkp.exe TID: 3144Thread sleep time: -16602069666338586s >= -30000s
                      Source: C:\Users\user\Desktop\O53TFikPkp.exe TID: 5528Thread sleep count: 8758 > 30
                      Source: C:\Users\user\Desktop\O53TFikPkp.exe TID: 5528Thread sleep count: 1093 > 30
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWindow / User API: threadDelayed 8758
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWindow / User API: threadDelayed 1093
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00405D7C FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00402630 FindFirstFileA,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00404A29 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeAPI call chain: ExitProcess graph end node
                      Source: O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_004067FE GetProcessHeap,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_0019E906 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_0019E6F2 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_0019EA34 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_0019E9B7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_0019E9F6 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_004035F1 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0046B510 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00401E1D SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeMemory written: C:\Users\user\Desktop\O53TFikPkp.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeProcess created: C:\Users\user\Desktop\O53TFikPkp.exe "C:\Users\user\Desktop\O53TFikPkp.exe"
                      Source: O53TFikPkp.exe, 00000002.00000002.923729585.0000000000EC0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: O53TFikPkp.exe, 00000002.00000002.923729585.0000000000EC0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: O53TFikPkp.exe, 00000002.00000002.923729585.0000000000EC0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: O53TFikPkp.exe, 00000002.00000002.923729585.0000000000EC0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_0040208D cpuid
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 2_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeCode function: 1_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.25e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.O53TFikPkp.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.3635530.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.25e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.4970000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.3635530.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22c1458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22b0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.O53TFikPkp.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22b0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.5646f8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22c1458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.O53TFikPkp.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.5646f8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.923015296.0000000000549000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.667167111.00000000022B0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000001.666315289.0000000000414000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.665066940.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.924840687.0000000004972000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.923912577.00000000025E0000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.922818649.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: O53TFikPkp.exe PID: 6712, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: O53TFikPkp.exe PID: 6892, type: MEMORYSTR
                      Tries to steal Mail credentials (via file / registry access)Show sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\Desktop\O53TFikPkp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: Yara matchFile source: 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: O53TFikPkp.exe PID: 6892, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.25e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.O53TFikPkp.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.3635530.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.25e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.4970000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.3635530.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22c1458.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22b0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.O53TFikPkp.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22b0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.5646f8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.O53TFikPkp.exe.22c1458.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.O53TFikPkp.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.5646f8.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.O53TFikPkp.exe.415058.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.O53TFikPkp.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.923015296.0000000000549000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.667167111.00000000022B0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000001.666315289.0000000000414000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.665066940.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.924840687.0000000004972000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.923912577.00000000025E0000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.922818649.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: O53TFikPkp.exe PID: 6712, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: O53TFikPkp.exe PID: 6892, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Disable or Modify Tools1OS Credential Dumping2System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                      Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery2Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSystem Information Discovery126SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing11NTDSQuery Registry1Distributed Component Object ModelClipboard Data1Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading11LSA SecretsSecurity Software Discovery231SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncVirtualization/Sandbox Evasion131Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      O53TFikPkp.exe51%VirustotalBrowse
                      O53TFikPkp.exe53%ReversingLabsWin32.Worm.SpyBot
                      O53TFikPkp.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\nsr28EF.tmp\eqbaypenr.dll41%ReversingLabsWin32.Trojan.SpyNoon

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.0.O53TFikPkp.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                      2.2.O53TFikPkp.exe.4970000.5.unpack100%AviraTR/Spy.Gen8Download File
                      2.2.O53TFikPkp.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.O53TFikPkp.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.O53TFikPkp.exe.400000.5.unpack100%AviraTR/Spy.Gen8Download File
                      2.1.O53TFikPkp.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.O53TFikPkp.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.O53TFikPkp.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.O53TFikPkp.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.O53TFikPkp.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://subca.ocsp-certu0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://UbQjJM.com0%Avira URL Cloudsafe
                      http://yandex.ocsp-responder.com030%URL Reputationsafe
                      https://bbTPeNUsMvT4JktW3MN.com0%Avira URL Cloudsafe
                      http://subca.ocsp-certum.com0.0%URL Reputationsafe
                      http://subca.ocsp-certum.com010%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://crl.certum0%Avira URL Cloudsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      smtp.yandex.ru
                      77.88.21.158
                      truefalse
                        high
                        smtp.yandex.com
                        unknown
                        unknownfalse
                          high

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://DynDns.comDynDNSO53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://subca.ocsp-certuO53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://repository.certum.pl/ctnca.cer09O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haO53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.certum.pl/ctnca.crl0kO53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                              high
                              http://yandex.crl.certum.pl/ycasha2.crl0qO53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                high
                                http://UbQjJM.comO53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://nsis.sf.net/NSIS_ErrorErrorO53TFikPkp.exefalse
                                  high
                                  https://www.certum.pl/CPS0O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                    high
                                    http://smtp.yandex.comO53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                      high
                                      http://yandex.ocsp-responder.com03O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://bbTPeNUsMvT4JktW3MN.comO53TFikPkp.exe, 00000002.00000002.924375629.00000000029A5000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924396051.00000000029AD000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.888941433.0000000005151000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://subca.ocsp-certum.com0.O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://repository.certum.pl/ca.cer09O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                        high
                                        http://nsis.sf.net/NSIS_ErrorO53TFikPkp.exefalse
                                          high
                                          http://crls.yandex.net/certum/ycasha2.crl0-O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                            high
                                            http://subca.ocsp-certum.com01O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://api.ipify.org%GETMozilla/5.0O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            low
                                            http://crl.certumO53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://crl.certum.pl/ca.crl0hO53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                              high
                                              https://api.ipify.org%O53TFikPkp.exe, 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              low
                                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipO53TFikPkp.exe, O53TFikPkp.exe, 00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.923912577.00000000025E0000.00000004.00020000.sdmp, O53TFikPkp.exe, 00000002.00000002.922818649.0000000000400000.00000040.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924840687.0000000004972000.00000040.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.certum.pl/CPS0O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                                high
                                                http://repository.certum.pl/ycasha2.cer0O53TFikPkp.exe, 00000002.00000003.906856475.0000000005AD6000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905948236.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925666483.0000000005AC2000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.925621657.0000000005A90000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924286996.0000000002981000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000003.905834271.0000000005AD4000.00000004.00000001.sdmp, O53TFikPkp.exe, 00000002.00000002.924446366.00000000029C3000.00000004.00000001.sdmpfalse
                                                  high

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  77.88.21.158
                                                  smtp.yandex.ruRussian Federation
                                                  13238YANDEXRUfalse

                                                  General Information

                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                  Analysis ID:552998
                                                  Start date:14.01.2022
                                                  Start time:03:36:24
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 7m 7s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:O53TFikPkp (renamed file extension from none to exe)
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:17
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.evad.winEXE@3/5@4/1
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HDC Information:
                                                  • Successful, ratio: 15.1% (good quality ratio 14.2%)
                                                  • Quality average: 80.2%
                                                  • Quality standard deviation: 28.8%
                                                  HCA Information:
                                                  • Successful, ratio: 87%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  Warnings:
                                                  Show All
                                                  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                  Simulations

                                                  Behavior and APIs

                                                  TimeTypeDescription
                                                  03:37:30API Interceptor733x Sleep call for process: O53TFikPkp.exe modified

                                                  Joe Sandbox View / Context

                                                  IPs

                                                  No context

                                                  Domains

                                                  No context

                                                  ASN

                                                  No context

                                                  JA3 Fingerprints

                                                  No context

                                                  Dropped Files

                                                  No context

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Temp\di4dp15wu7r4o4e8
                                                  Process:C:\Users\user\Desktop\O53TFikPkp.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):292863
                                                  Entropy (8bit):7.960756321339627
                                                  Encrypted:false
                                                  SSDEEP:6144:nG5d30duZbuUYgGsFxZZLt2lGPSgQF5P+tauUASi2/WNhBR20fJtq:Gr3WuZbuUYXsF7dklTNv6N7Rvfe
                                                  MD5:836F7E06923775EBB7DA041B320352E7
                                                  SHA1:BAA947AC30331C0E38F17FD42E45D485E2BF1B93
                                                  SHA-256:432EE7145FF38C9BA1538CD1B9A06B9C724623CEECF1EB55BDB32D2F5D3383D7
                                                  SHA-512:92C969F43B9994CAC1F88FFF0E155A509D0D6B38F59AAD6F63BB23E0BC30901D8940B3B6A2ECDB15BDE8ECD91FB2FB09D4C1286E4950B808B5B3DB0DBF2039DD
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: .0..Kg.K`..h...m.D....A.K.......C......!.l.x..A.._.<)....*,c<..r..v..1.~.~..8H...\<...s.j..P.z.hy...r.i~MSw...P..:.5.....F{X.n...3+..!b...#0.)..!..]...J..2.e.L.!.V-.......2{'/...&[b(2....._...B.>......{...E;6..i!..3:.G.]......'Z3U&c0s.L.7a...;...N}..sg.K...h..m}..]...A.K..q.9d.....D..!...x..A.-_..<).?....i<.u/....#~P69..f.#....+a-.@PS...1. ........?/..Da% ....{{X.Q&1......Y.gU..<.N4..E. .B.6..\.to..n...+.+...S$...Zh...4".}.^$.....s..,:..1r....}.......=,...FY..5Zi.......<<'...Q.k...;....QU.Rg.K.".h.n.mr...B.A.K.......C..'.......A..A.;_.s<).....Lc<../..J..7#.P+9..OI.D..!.a-%.PS/...0...a..^..?/....%..a!.a@X.i&1......u.g.N<....=. .B........n.....+..S.6...h..4".}.^$....s.J,:..1r....}......=,...F.....i.......<<'...Q.k...;...N}..sg.K...h...mrD....A.K.......C......!.l.x..A.._.<)......c<../..J..7#.P69..f.#...P.a- @PS..... ..a..^..?/..D.% ....F{X.Q&1......].g..<....=. .B.6..\.to..n...+.+...S....h...4".}.^$.....s..,:..1r....}......=,...F.....i.
                                                  C:\Users\user\AppData\Local\Temp\nsr28EE.tmp
                                                  Process:C:\Users\user\Desktop\O53TFikPkp.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):326482
                                                  Entropy (8bit):7.78664277552046
                                                  Encrypted:false
                                                  SSDEEP:6144:XCrqG5d30duZbuUYgGsFxZZLt2lGPSgQF5P+tauUASi2/WNhBR20fJt:SNr3WuZbuUYXsF7dklTNv6N7Rvf
                                                  MD5:97A7BA9AF50642C7397AA0533D53206E
                                                  SHA1:67B6E642A98AD4E8BE87568EC0D7D3B3581D2EAA
                                                  SHA-256:DBFAC0266262C8ADB6BDB311E4FCC3EFC41DA69AE0F8E07DA261022AB80214D9
                                                  SHA-512:CE1C41E77024A5DF6A01E7A1E0C9BB716354B51BAE874166159FB76ED9E4B3AD5E59859FB9E43DDBEBA34E192CD5F9A9D953332BE9539D39A8A3357F7F97A7F6
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: .\......,...................&....F.......[......s\..........................................................................................................................................................................................................................................J...................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\nsr28EF.tmp\eqbaypenr.dll
                                                  Process:C:\Users\user\Desktop\O53TFikPkp.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4608
                                                  Entropy (8bit):3.7803683556919934
                                                  Encrypted:false
                                                  SSDEEP:48:CnGI9I+Li4RxYtY8qxpnFbfGFN1RuqSd:iGyW4RxY2xpF49x
                                                  MD5:24E8067B956182DDEE35AB317DE624C6
                                                  SHA1:37E4431822CA95FD5B26248A36C39FDF9F6B7A9D
                                                  SHA-256:BA259C3BF51AE2B5CEAF843DD2E5CAE3865ACBA2F5E81115FA6D3F4BB1D3F392
                                                  SHA-512:31CE4162321577E54FC48BE48131305F361C2CCFFAB2B5542DAF88B6F1D3ED66C75ADBFA60E758462A450E5DC1D0CF883B3B868F52577087C69DABF1B1A0D6B2
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 41%
                                                  Reputation:low
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z-...C]..C]..C]Z.M]..C].}B\..C]..B]..C].nG\..C].nC\..C].n.]..C].nA\..C]Rich..C]........................PE..L...3..a...........!......................... ...............................P............@.......................... ..H.... .......0.......................@..<.................................................... ...............................text...O........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@.reloc..<....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\okjdlpklcx
                                                  Process:C:\Users\user\Desktop\O53TFikPkp.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):5304
                                                  Entropy (8bit):6.087454449151516
                                                  Encrypted:false
                                                  SSDEEP:96:g6P9SMp73nKbDsHM8u7ni6F4RI+3ZqYHRdML4O9xl12yq160N2D3PDz:g6P9NTnDs8ue6alhH3MkqYpJN2b
                                                  MD5:D3D435ACB4C52B21856675D898614EF0
                                                  SHA1:498FA98468A240DDF040804A4F952517B27EAF3A
                                                  SHA-256:7282D29AE2D2BBF420B65E435651A86778BD6F3170C34BBCE183D756FA7D4B31
                                                  SHA-512:7E126163569E8921580B47D6015E324263737FE74E734398F15A4B4272A666E0DD0F8D116D08926ED31472098030FB189FDEB09EA5E998A50DC861EED57C7B96
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: "/.......G.......8..8tF'8..8tF......F._.........;..7.F.w......F/..+..;..7.F.w......F...3..;..7.F.w.4....F......;..7.F.w......F....7..Q...\...F;.F'..#.F7...T.F..~.F..~....T..7...F.......F.......#.T.......c......./........J....J...'........7.?.;..?.{.g......./J..F.8..F..........Cc.d.....c>.......F....&..;....zz8..8tF..F...LF;.g.F....~7.s....C...F..F...G.~....F.....&..;..u........]....s....(...............>........A.........._8..8tF..F.7....F/.F......u.F.....F.G.F..F.?.F..#.s.....E.F....\...C>/..>+.F.....*..C>/..>+.....\...C./w...(......w......F..8.F.w....A....F..............F......F.&........G8..8tF..F._....F.F......u.F.....F.G.F..F.?.F..#.......8......F....\...C>..>.F;....*..C>..>.F7....*.C>..>.FsT...\...Cv.{v.F.....*..C>..>.....\...C..w.u...%...w.$....F...o....F..~o...p..o..s..7..;....P....F..............F......F.&..s.....k.F.7....F#.F......u.F.....F.G.F..F.?.F..#.......E.F....\...C>#..>..F;....*..C>#..>......\...C.#w.>...`...w.c....F..=..
                                                  C:\Users\user\AppData\Roaming\yf3kqygs.3ju\Chrome\Default\Cookies
                                                  Process:C:\Users\user\Desktop\O53TFikPkp.exe
                                                  File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                  Category:dropped
                                                  Size (bytes):20480
                                                  Entropy (8bit):0.7006690334145785
                                                  Encrypted:false
                                                  SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                                  MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                                  SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                                  SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                                  SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                  Entropy (8bit):7.937396375196458
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 92.16%
                                                  • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:O53TFikPkp.exe
                                                  File size:271485
                                                  MD5:be56d049ee926fbccec623695d12a5c6
                                                  SHA1:1fa7ea2d0e348b7e1d79a7e6426e6f10376238e4
                                                  SHA256:626213dec6f5f7c552974fc4d9fe954cb70b94f03588aa4550cd545789034167
                                                  SHA512:571bf9c0c0ca1c70a71ff1c92bf8e0da04a27ee013097a770ad319165bab274f483adea5fc00dc78b4e1e88f10c3eb70eb64c338593360294cf4b8664eceb0f3
                                                  SSDEEP:6144:owsJm3jpsSbMcpJxUNhZfbn5Svf7AkjdOFIP6:B3lTbvpJqNj5af7DjAFIi
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....

                                                  File Icon

                                                  Icon Hash:b2a88c96b2ca6a72

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x403225
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                  DLL Characteristics:
                                                  Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:099c0646ea7282d232219f8807883be0

                                                  Entrypoint Preview

                                                  Instruction
                                                  sub esp, 00000180h
                                                  push ebx
                                                  push ebp
                                                  push esi
                                                  xor ebx, ebx
                                                  push edi
                                                  mov dword ptr [esp+18h], ebx
                                                  mov dword ptr [esp+10h], 00409128h
                                                  xor esi, esi
                                                  mov byte ptr [esp+14h], 00000020h
                                                  call dword ptr [00407030h]
                                                  push 00008001h
                                                  call dword ptr [004070B4h]
                                                  push ebx
                                                  call dword ptr [0040727Ch]
                                                  push 00000008h
                                                  mov dword ptr [00423F58h], eax
                                                  call 00007FAEB0CD1990h
                                                  mov dword ptr [00423EA4h], eax
                                                  push ebx
                                                  lea eax, dword ptr [esp+34h]
                                                  push 00000160h
                                                  push eax
                                                  push ebx
                                                  push 0041F450h
                                                  call dword ptr [00407158h]
                                                  push 004091B0h
                                                  push 004236A0h
                                                  call 00007FAEB0CD1647h
                                                  call dword ptr [004070B0h]
                                                  mov edi, 00429000h
                                                  push eax
                                                  push edi
                                                  call 00007FAEB0CD1635h
                                                  push ebx
                                                  call dword ptr [0040710Ch]
                                                  cmp byte ptr [00429000h], 00000022h
                                                  mov dword ptr [00423EA0h], eax
                                                  mov eax, edi
                                                  jne 00007FAEB0CCEE5Ch
                                                  mov byte ptr [esp+14h], 00000022h
                                                  mov eax, 00429001h
                                                  push dword ptr [esp+14h]
                                                  push eax
                                                  call 00007FAEB0CD1128h
                                                  push eax
                                                  call dword ptr [0040721Ch]
                                                  mov dword ptr [esp+1Ch], eax
                                                  jmp 00007FAEB0CCEEB5h
                                                  cmp cl, 00000020h
                                                  jne 00007FAEB0CCEE58h
                                                  inc eax
                                                  cmp byte ptr [eax], 00000020h
                                                  je 00007FAEB0CCEE4Ch
                                                  cmp byte ptr [eax], 00000022h
                                                  mov byte ptr [eax+eax+00h], 00000000h

                                                  Rich Headers

                                                  Programming Language:
                                                  • [EXP] VC++ 6.0 SP5 build 8804

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x900.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                  .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .rsrc0x2c0000x9000xa00False0.409375data3.94693169534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_ICON0x2c1900x2e8dataEnglishUnited States
                                                  RT_DIALOG0x2c4780x100dataEnglishUnited States
                                                  RT_DIALOG0x2c5780x11cdataEnglishUnited States
                                                  RT_DIALOG0x2c6980x60dataEnglishUnited States
                                                  RT_GROUP_ICON0x2c6f80x14dataEnglishUnited States
                                                  RT_MANIFEST0x2c7100x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                  Imports

                                                  DLLImport
                                                  KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                                  USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                  GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                  SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                  ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                  COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                  ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                  VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                                                  Possible Origin

                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States

                                                  Network Behavior

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 14, 2022 03:39:12.640427113 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:12.702661991 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:12.702799082 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:12.969264984 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:12.969578981 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.031738043 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.031784058 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.032092094 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.094244957 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.144457102 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.169887066 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.233504057 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.233565092 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.233608961 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.233643055 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.233741045 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.233824015 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.283977985 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.346339941 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.394463062 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.554766893 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.617073059 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.622107983 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.684242964 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.685511112 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.758352041 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.759191990 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.828363895 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.828902006 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.896285057 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.896718979 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.958669901 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:13.961158991 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.961252928 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.961954117 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:13.962029934 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:14.023521900 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:14.023869038 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:14.301125050 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:14.347603083 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:15.345776081 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:15.408023119 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:15.408072948 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:15.408171892 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:15.470020056 CET49803587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:15.524184942 CET5874980377.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:15.696842909 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:15.749696970 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:15.750267029 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.042094946 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.042336941 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.096849918 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.096930027 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.097151041 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.149956942 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.151098967 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.208024979 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.208069086 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.208101988 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.208125114 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.208189964 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.208240986 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.210980892 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.264277935 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.268340111 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.321290970 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.322027922 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.374800920 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.375380993 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.445894003 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.446538925 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.511137962 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.511740923 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.566800117 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.567167044 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.620017052 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.622200012 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.622549057 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.623003006 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.623359919 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.623719931 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.623960972 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.624140978 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.624342918 CET49807587192.168.2.477.88.21.158
                                                  Jan 14, 2022 03:39:16.675165892 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.676017046 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.676315069 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.676707983 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:16.722557068 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:17.023792982 CET5874980777.88.21.158192.168.2.4
                                                  Jan 14, 2022 03:39:17.066673994 CET49807587192.168.2.477.88.21.158

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 14, 2022 03:39:12.476604939 CET5662153192.168.2.48.8.8.8
                                                  Jan 14, 2022 03:39:12.493963957 CET53566218.8.8.8192.168.2.4
                                                  Jan 14, 2022 03:39:12.521090031 CET6311653192.168.2.48.8.8.8
                                                  Jan 14, 2022 03:39:12.540709019 CET53631168.8.8.8192.168.2.4
                                                  Jan 14, 2022 03:39:15.646847010 CET6407853192.168.2.48.8.8.8
                                                  Jan 14, 2022 03:39:15.666949987 CET53640788.8.8.8192.168.2.4
                                                  Jan 14, 2022 03:39:15.674953938 CET6480153192.168.2.48.8.8.8
                                                  Jan 14, 2022 03:39:15.695369959 CET53648018.8.8.8192.168.2.4

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Jan 14, 2022 03:39:12.476604939 CET192.168.2.48.8.8.80x95e0Standard query (0)smtp.yandex.comA (IP address)IN (0x0001)
                                                  Jan 14, 2022 03:39:12.521090031 CET192.168.2.48.8.8.80xbd24Standard query (0)smtp.yandex.comA (IP address)IN (0x0001)
                                                  Jan 14, 2022 03:39:15.646847010 CET192.168.2.48.8.8.80x9b97Standard query (0)smtp.yandex.comA (IP address)IN (0x0001)
                                                  Jan 14, 2022 03:39:15.674953938 CET192.168.2.48.8.8.80x548eStandard query (0)smtp.yandex.comA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Jan 14, 2022 03:39:12.493963957 CET8.8.8.8192.168.2.40x95e0No error (0)smtp.yandex.comsmtp.yandex.ruCNAME (Canonical name)IN (0x0001)
                                                  Jan 14, 2022 03:39:12.493963957 CET8.8.8.8192.168.2.40x95e0No error (0)smtp.yandex.ru77.88.21.158A (IP address)IN (0x0001)
                                                  Jan 14, 2022 03:39:12.540709019 CET8.8.8.8192.168.2.40xbd24No error (0)smtp.yandex.comsmtp.yandex.ruCNAME (Canonical name)IN (0x0001)
                                                  Jan 14, 2022 03:39:12.540709019 CET8.8.8.8192.168.2.40xbd24No error (0)smtp.yandex.ru77.88.21.158A (IP address)IN (0x0001)
                                                  Jan 14, 2022 03:39:15.666949987 CET8.8.8.8192.168.2.40x9b97No error (0)smtp.yandex.comsmtp.yandex.ruCNAME (Canonical name)IN (0x0001)
                                                  Jan 14, 2022 03:39:15.666949987 CET8.8.8.8192.168.2.40x9b97No error (0)smtp.yandex.ru77.88.21.158A (IP address)IN (0x0001)
                                                  Jan 14, 2022 03:39:15.695369959 CET8.8.8.8192.168.2.40x548eNo error (0)smtp.yandex.comsmtp.yandex.ruCNAME (Canonical name)IN (0x0001)
                                                  Jan 14, 2022 03:39:15.695369959 CET8.8.8.8192.168.2.40x548eNo error (0)smtp.yandex.ru77.88.21.158A (IP address)IN (0x0001)

                                                  SMTP Packets

                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Jan 14, 2022 03:39:12.969264984 CET5874980377.88.21.158192.168.2.4220 vla5-047c0c0d12a6.qloud-c.yandex.net ESMTP (Want to use Yandex.Mail for your domain? Visit http://pdd.yandex.ru) 1642127952-QQ7GqpzHRI-dCPe5Bo9
                                                  Jan 14, 2022 03:39:12.969578981 CET49803587192.168.2.477.88.21.158EHLO 088753
                                                  Jan 14, 2022 03:39:13.031784058 CET5874980377.88.21.158192.168.2.4250-vla5-047c0c0d12a6.qloud-c.yandex.net
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-SIZE 53477376
                                                  250-STARTTLS
                                                  250-AUTH LOGIN PLAIN XOAUTH2
                                                  250-DSN
                                                  250 ENHANCEDSTATUSCODES
                                                  Jan 14, 2022 03:39:13.032092094 CET49803587192.168.2.477.88.21.158STARTTLS
                                                  Jan 14, 2022 03:39:13.094244957 CET5874980377.88.21.158192.168.2.4220 Go ahead
                                                  Jan 14, 2022 03:39:16.042094946 CET5874980777.88.21.158192.168.2.4220 myt5-cceafa914410.qloud-c.yandex.net ESMTP (Want to use Yandex.Mail for your domain? Visit http://pdd.yandex.ru) 1642127956-YBrbW5xT92-dFPq8SOr
                                                  Jan 14, 2022 03:39:16.042336941 CET49807587192.168.2.477.88.21.158EHLO 088753
                                                  Jan 14, 2022 03:39:16.096930027 CET5874980777.88.21.158192.168.2.4250-myt5-cceafa914410.qloud-c.yandex.net
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-SIZE 53477376
                                                  250-STARTTLS
                                                  250-AUTH LOGIN PLAIN XOAUTH2
                                                  250-DSN
                                                  250 ENHANCEDSTATUSCODES
                                                  Jan 14, 2022 03:39:16.097151041 CET49807587192.168.2.477.88.21.158STARTTLS
                                                  Jan 14, 2022 03:39:16.149956942 CET5874980777.88.21.158192.168.2.4220 Go ahead

                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:03:37:17
                                                  Start date:14/01/2022
                                                  Path:C:\Users\user\Desktop\O53TFikPkp.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\O53TFikPkp.exe"
                                                  Imagebase:0x400000
                                                  File size:271485 bytes
                                                  MD5 hash:BE56D049EE926FBCCEC623695D12A5C6
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.667167111.00000000022B0000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.667167111.00000000022B0000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  General

                                                  Start time:03:37:18
                                                  Start date:14/01/2022
                                                  Path:C:\Users\user\Desktop\O53TFikPkp.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\O53TFikPkp.exe"
                                                  Imagebase:0x400000
                                                  File size:271485 bytes
                                                  MD5 hash:BE56D049EE926FBCCEC623695D12A5C6
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.665781318.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.924721394.0000000003631000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.923015296.0000000000549000.00000004.00000020.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.923015296.0000000000549000.00000004.00000020.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.923951407.0000000002631000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000001.666315289.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000001.666315289.0000000000414000.00000040.00020000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.665066940.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.665066940.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.924840687.0000000004972000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.924840687.0000000004972000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.923912577.00000000025E0000.00000004.00020000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.923912577.00000000025E0000.00000004.00020000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.922818649.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.922818649.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >