Loading ...

Play interactive tourEdit tour

Windows Analysis Report 3NeufRwoxF

Overview

General Information

Sample Name:3NeufRwoxF (renamed file extension from none to exe)
Analysis ID:553010
MD5:891fafcb65f039cefac6701bfb8a9253
SHA1:e9ca83ec5e9a9264d251a3379d65dd9dfe92a16a
SHA256:3c6d3aa382ddba97862136aa06c449150810696ef7cb05e7ec0f4ed6895683c4
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • 3NeufRwoxF.exe (PID: 4484 cmdline: "C:\Users\user\Desktop\3NeufRwoxF.exe" MD5: 891FAFCB65F039CEFAC6701BFB8A9253)
    • 3NeufRwoxF.exe (PID: 4828 cmdline: "C:\Users\user\Desktop\3NeufRwoxF.exe" MD5: 891FAFCB65F039CEFAC6701BFB8A9253)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "info.superseal@yandex.com", "Password": "Golddigger", "Host": "smtp.yandex.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 18 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.0.3NeufRwoxF.exe.415058.7.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.0.3NeufRwoxF.exe.415058.7.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.2.3NeufRwoxF.exe.23c0000.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.3NeufRwoxF.exe.23c0000.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    2.2.3NeufRwoxF.exe.23c0000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 51 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 2.0.3NeufRwoxF.exe.400000.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info.superseal@yandex.com", "Password": "Golddigger", "Host": "smtp.yandex.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: 3NeufRwoxF.exeVirustotal: Detection: 44%Perma Link
                      Source: 3NeufRwoxF.exeReversingLabs: Detection: 51%
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Local\Temp\nsvCA57.tmp\qvddvmam.dllReversingLabs: Detection: 42%
                      Machine Learning detection for sampleShow sources
                      Source: 3NeufRwoxF.exeJoe Sandbox ML: detected
                      Source: 2.0.3NeufRwoxF.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.3NeufRwoxF.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.3NeufRwoxF.exe.49d0000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.3NeufRwoxF.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.2.3NeufRwoxF.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.1.3NeufRwoxF.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.3NeufRwoxF.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.3NeufRwoxF.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.3NeufRwoxF.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                      Source: 2.0.3NeufRwoxF.exe.400000.5.unpackAvira: Label: TR/Spy.Gen8
                      Source: 3NeufRwoxF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: Binary string: wntdll.pdbUGP source: 3NeufRwoxF.exe, 00000000.00000003.649117191.0000000003200000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000000.00000003.649806691.0000000003070000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: 3NeufRwoxF.exe, 00000000.00000003.649117191.0000000003200000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000000.00000003.649806691.0000000003070000.00000004.00000001.sdmp
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00402630 FindFirstFileA,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00404A29 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_00404A29 FindFirstFileExW,
                      Source: Joe Sandbox ViewIP Address: 77.88.21.158 77.88.21.158
                      Source: global trafficTCP traffic: 192.168.2.4:49760 -> 77.88.21.158:587
                      Source: global trafficTCP traffic: 192.168.2.4:49760 -> 77.88.21.158:587
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpString found in binary or memory: http://MXCHOJ.com
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum.pl/ca.crl0h
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpString found in binary or memory: http://crls.ya
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: http://crls.yandex.net/certum/ycasha2.crl0-
                      Source: 3NeufRwoxF.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                      Source: 3NeufRwoxF.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ca.cer09
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ctnca.cer09
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ycasha2.cer0
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certum.com0.
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certum.com01
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpString found in binary or memory: http://www.certum.pl/CPS0
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: http://yandex.crl.certum.pl/ycasha2.crl0q
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpString found in binary or memory: http://yandex.oc
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: http://yandex.ocsp-responder.com03
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpString found in binary or memory: https://www.certum.pl/CPS0
                      Source: 3NeufRwoxF.exe, 3NeufRwoxF.exe, 00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734128431.0000000000859000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734722737.00000000038D1000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734344539.00000000023C0000.00000004.00020000.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734912309.00000000049D2000.00000040.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.733760702.0000000000400000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: smtp.yandex.com
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.2.3NeufRwoxF.exe.49d0000.4.unpack, u003cPrivateImplementationDetailsu003eu007b5B80CC66u002dD458u002d4855u002d8E40u002dDE61FFEE2428u007d/u003064B2095u002d1A80u002d43DBu002dB33Eu002dDC28338E94F6.csLarge array initialization: .cctor: array initializer size 12036
                      Source: 3NeufRwoxF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_0040604C
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00404772
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0040A2A5
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_0040A2A5
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: String function: 00401ED0 appears 46 times
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: String function: 0040569E appears 36 times
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0078B136 NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0078B105 NtQuerySystemInformation,
                      Source: 3NeufRwoxF.exe, 00000000.00000003.651181443.000000000331F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000000.00000003.649069074.0000000003186000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000000.00000002.656663064.0000000003020000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exeBinary or memory string: OriginalFilename vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734128431.0000000000859000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734722737.00000000038D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734344539.00000000023C0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000002.734912309.00000000049D2000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exe, 00000002.00000002.733760702.0000000000400000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameRHSOrQoYBuAPkDraNpMdntgxMdPAa.exe4 vs 3NeufRwoxF.exe
                      Source: 3NeufRwoxF.exeVirustotal: Detection: 44%
                      Source: 3NeufRwoxF.exeReversingLabs: Detection: 51%
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile read: C:\Users\user\Desktop\3NeufRwoxF.exeJump to behavior
                      Source: 3NeufRwoxF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Users\user\Desktop\3NeufRwoxF.exe "C:\Users\user\Desktop\3NeufRwoxF.exe"
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess created: C:\Users\user\Desktop\3NeufRwoxF.exe "C:\Users\user\Desktop\3NeufRwoxF.exe"
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess created: C:\Users\user\Desktop\3NeufRwoxF.exe "C:\Users\user\Desktop\3NeufRwoxF.exe"
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0078AFBA AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0078AF83 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile created: C:\Users\user\AppData\Roaming\wordJump to behavior
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile created: C:\Users\user\AppData\Local\Temp\nsvCA55.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@3/5@1/1
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
                      Source: 2.2.3NeufRwoxF.exe.49d0000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.3NeufRwoxF.exe.49d0000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: Binary string: wntdll.pdbUGP source: 3NeufRwoxF.exe, 00000000.00000003.649117191.0000000003200000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000000.00000003.649806691.0000000003070000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: 3NeufRwoxF.exe, 00000000.00000003.649117191.0000000003200000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000000.00000003.649806691.0000000003070000.00000004.00000001.sdmp
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_72B21000 push eax; ret
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00401F16 push ecx; ret
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_00401F16 push ecx; ret
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeFile created: C:\Users\user\AppData\Local\Temp\nsvCA57.tmp\qvddvmam.dllJump to dropped file
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run wordJump to behavior
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run wordJump to behavior
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exe TID: 6800Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exe TID: 6800Thread sleep time: -4080000s >= -30000s
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exe TID: 6800Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00402630 FindFirstFileA,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00404A29 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_00404A29 FindFirstFileExW,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeThread delayed: delay time: 30000
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeThread delayed: delay time: 30000
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeAPI call chain: ExitProcess graph end node
                      Source: 3NeufRwoxF.exe, 00000002.00000002.735683067.0000000005486000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_004067FE GetProcessHeap,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_0019EA84 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_0019EA07 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_0019E956 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_0019E742 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_0019EA46 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_004035F1 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_004035F1 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_024337AF LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00401E1D SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_00401E1D SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_1_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeMemory written: C:\Users\user\Desktop\3NeufRwoxF.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeProcess created: C:\Users\user\Desktop\3NeufRwoxF.exe "C:\Users\user\Desktop\3NeufRwoxF.exe"
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0040208D cpuid
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,
                      Source: C:\Users\user\Desktop\3NeufRwoxF.exeCode function: 2_2_0078BB16 GetUserNameW,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.23c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.23c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3031458.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.49d0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.415058.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3020000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.38d3258.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.415058.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3020000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3031458.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.38d3258.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.653816558.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734722737.00000000038D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.656663064.0000000003020000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734344539.00000000023C0000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734912309.00000000049D2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.733760702.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3NeufRwoxF.exe PID: 4484, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 3NeufRwoxF.exe PID: 4828, type: MEMORYSTR
                      Source: Yara matchFile source: 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3NeufRwoxF.exe PID: 4828, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.23c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.23c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3031458.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.49d0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.415058.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.415058.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3020000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.3NeufRwoxF.exe.415058.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.38d3258.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.415058.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3020000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.3NeufRwoxF.exe.3031458.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.415058.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.3NeufRwoxF.exe.38d3258.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.3NeufRwoxF.exe.400000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.653816558.0000000000414000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734722737.00000000038D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.656663064.0000000003020000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734344539.00000000023C0000.00000004.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734912309.00000000049D2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.733760702.0000000000400000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 3NeufRwoxF.exe PID: 4484, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: 3NeufRwoxF.exe PID: 4828, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Access Token Manipulation1Disable or Modify Tools1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                      Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection111Deobfuscate/Decode Files or Information11LSASS MemoryAccount Discovery1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSSystem Information Discovery126Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsQuery Registry1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsSecurity Software Discovery231VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection111Proc FilesystemVirtualization/Sandbox Evasion131Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      3NeufRwoxF.exe45%VirustotalBrowse
                      3NeufRwoxF.exe51%ReversingLabsWin32.Trojan.AgentTesla
                      3NeufRwoxF.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\nsvCA57.tmp\qvddvmam.dll43%ReversingLabsWin32.Trojan.SpyNoon

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.0.3NeufRwoxF.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.3NeufRwoxF.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                      2.2.3NeufRwoxF.exe.49d0000.4.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.3NeufRwoxF.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                      2.2.3NeufRwoxF.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      2.1.3NeufRwoxF.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.3NeufRwoxF.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.3NeufRwoxF.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.3NeufRwoxF.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                      2.0.3NeufRwoxF.exe.400000.5.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://subca.ocsp-certum.com0.0%URL Reputationsafe
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://yandex.oc0%Avira URL Cloudsafe
                      http://crls.ya0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://MXCHOJ.com0%Avira URL Cloudsafe
                      http://subca.ocsp-certum.com010%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://yandex.ocsp-responder.com030%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      smtp.yandex.ru
                      77.88.21.158
                      truefalse
                        high
                        smtp.yandex.com
                        unknown
                        unknownfalse
                          high

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://subca.ocsp-certum.com0.3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://repository.certum.pl/ca.cer093NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpfalse
                            high
                            http://127.0.0.1:HTTP/1.13NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://DynDns.comDynDNS3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://yandex.oc3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://nsis.sf.net/NSIS_Error3NeufRwoxF.exefalse
                              high
                              http://repository.certum.pl/ctnca.cer093NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                high
                                http://crls.ya3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crls.yandex.net/certum/ycasha2.crl0-3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                  high
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://crl.certum.pl/ctnca.crl0k3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                    high
                                    http://MXCHOJ.com3NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://subca.ocsp-certum.com013NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://yandex.crl.certum.pl/ycasha2.crl0q3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                      high
                                      https://api.ipify.org%GETMozilla/5.03NeufRwoxF.exe, 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      low
                                      http://crl.certum.pl/ca.crl0h3NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpfalse
                                        high
                                        http://nsis.sf.net/NSIS_ErrorError3NeufRwoxF.exefalse
                                          high
                                          https://www.certum.pl/CPS03NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                            high
                                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip3NeufRwoxF.exe, 3NeufRwoxF.exe, 00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734128431.0000000000859000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734722737.00000000038D1000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734344539.00000000023C0000.00000004.00020000.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734912309.00000000049D2000.00000040.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.733760702.0000000000400000.00000040.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.certum.pl/CPS03NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730405870.00000000054A7000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735737044.00000000054A9000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000003.730411545.00000000054A9000.00000004.00000001.sdmpfalse
                                              high
                                              http://yandex.ocsp-responder.com033NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://repository.certum.pl/ycasha2.cer03NeufRwoxF.exe, 00000002.00000002.735720078.000000000549D000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.735652299.0000000005450000.00000004.00000001.sdmp, 3NeufRwoxF.exe, 00000002.00000002.734675386.00000000029EF000.00000004.00000001.sdmpfalse
                                                high

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                77.88.21.158
                                                smtp.yandex.ruRussian Federation
                                                13238YANDEXRUfalse

                                                General Information

                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:553010
                                                Start date:14.01.2022
                                                Start time:04:15:16
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 6m 22s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:3NeufRwoxF (renamed file extension from none to exe)
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:16
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@3/5@1/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:
                                                • Successful, ratio: 55.1% (good quality ratio 50.9%)
                                                • Quality average: 77.6%
                                                • Quality standard deviation: 30.9%
                                                HCA Information:
                                                • Successful, ratio: 82%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                • Excluded IPs from analysis (whitelisted): 20.190.160.6, 20.190.160.129, 20.190.160.75, 20.190.160.134, 20.190.160.136, 20.190.160.2, 20.190.160.67, 20.190.160.4, 23.203.70.208, 23.205.178.153
                                                • Excluded domains from analysis (whitelisted): www.tm.lg.prod.aadmsa.akadns.net, www.tm.a.prd.aadg.akadns.net, arc.msn.com, login.msa.msidentity.com, ris.api.iris.microsoft.com, e11290.dspg.akamaiedge.net, e13551.dscg.akamaiedge.net, msagfx.live.com-6.edgekey.net, authgfx.msa.akadns6.net, go.microsoft.com, store-images.s-microsoft.com, login.live.com, go.microsoft.com.edgekey.net, clientconfig.passport.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                04:16:14API Interceptor228x Sleep call for process: 3NeufRwoxF.exe modified
                                                04:16:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run word C:\Users\user\AppData\Roaming\word\word.exe
                                                04:16:36AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run word C:\Users\user\AppData\Roaming\word\word.exe

                                                Joe Sandbox View / Context

                                                IPs

                                                No context

                                                Domains

                                                No context

                                                ASN

                                                No context

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\3NeufRwoxF.exe.log
                                                Process:C:\Users\user\Desktop\3NeufRwoxF.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1035
                                                Entropy (8bit):5.26629226223271
                                                Encrypted:false
                                                SSDEEP:24:MLF20NaL329hJ5g522rWz2pmyE49EY829XBp26K95rKoO2+g2+:MwLLG9h3go2rG2Iyb9P9XBY6ox+g2+
                                                MD5:B1B758A3B5F51F96241EF50244ADD244
                                                SHA1:FA513B977BF2DF5B6F279046B2D7B4BA024D3B68
                                                SHA-256:BAAFDBA30F16DFCDBC5601E4166BD5E1D3A1EAA08E9E68E44A96B00206222481
                                                SHA-512:A683EEEF8F41FE80EC1EFD262CE023951B262ADD965F7A0610D6A92B6C1B561D3F6ECBF165122DB06DD085D5FC19956C047C18D7CA012E549D7DE48BB0E0C718
                                                Malicious:true
                                                Reputation:low
                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\CustomMarshalers\6e9bdd78f7a8bb20d228fefdaa957d00\CustomMarshalers.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\4de99804c29261edb63c93616550f034\System.Management.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\de460308a9099237864d2ec2328fc958\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d
                                                C:\Users\user\AppData\Local\Temp\kusazc8wp39
                                                Process:C:\Users\user\Desktop\3NeufRwoxF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):292351
                                                Entropy (8bit):7.963680613819231
                                                Encrypted:false
                                                SSDEEP:6144:5J7j/PKBR0SZfeudE96KIb/78b99INzXBtVpffaPS6GXBapeYv3kXteyg:DP+HZW196KIzjNzXBLpXRFAAYvIFg
                                                MD5:B5CCA07383DB50DF2C8791E4D49D0388
                                                SHA1:A0C0F92616231ECC57C819E52F672CF31360A7D8
                                                SHA-256:52C89193D7D69F546AC45181644669C0FBB7F71BC892361043E7D197007A3332
                                                SHA-512:19B0A0CC4C4066B543F574B22A1B5078F0691B77C32F9395AC11D42720A9A2BB05B119F6983280567E234AF15F5E6A3C6C57FC4EEEA0B7AE9EFF730310C5259B
                                                Malicious:false
                                                Reputation:low
                                                Preview: .|m...Y.u.....#I.g.T2~J.-n0....?..c..;.....oR....O.|D.U5.......o..Zu...Z........^z.s{...9(...+H.....:skY..c./.Q)..S...3K..'\.....6..Aw...Oy..D...C..4.........,G.H[...... .......l..L....X...(.|u..\......."..*.[,..|...m...n....2Y..pE......G.+...k....Y..i....#cT&sT2~J.-n0..L.(.c..;......oR.^..OQ|D.l5..5...r...{...~......j5.....@...o$.2..>.z..'s.77J..H.~H......K..)K..Zr..vT.....+.e..#J.f..C.1....!...i).$P..K&..o!...^/<.....=,I.]..gT:v..........t..A.'....,........H.........#...G.+.....1L1.Y.6...a,.#..g.T%~J.-n0....?..c..;;.N..ooR!u..O.|D..5............e~..G...z.i...;DQ...5.2`...$E..&'s'77J.9H^.H.v*.*.-..mK..([.U.t.a...+....2.f..Cm1...}...i).........v.k../<.....=,I....dT:v......j...t..A.'.............H.........#...G.+...k....Y.....aN.#..g.T2~J.-n0....?..c..;.....oR....O.|D.U5..5.........e~.......5.....WQ...$.2.....&'s'77J.9H..H.....3K..)K..Zr.U.t.a...+....2.f..C.1....!...i).$P..K&.{..k.^/<.....=,I.]..gT:v......j...t..A.'...........
                                                C:\Users\user\AppData\Local\Temp\nsvCA56.tmp
                                                Process:C:\Users\user\Desktop\3NeufRwoxF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):329718
                                                Entropy (8bit):7.759225914420623
                                                Encrypted:false
                                                SSDEEP:6144:W0J7j/PKBR0SZfeudE96KIb/78b99INzXBtVpffaPS6GXBapeYv3kXteyDX:ZP+HZW196KIzjNzXBLpXRFAAYvIFD
                                                MD5:450A7BE54EEBE6430CCF5B72345E6BF8
                                                SHA1:E671D233C186B44CC64C9FBAF6A3A6846CF7A5D9
                                                SHA-256:6326557B1B47C65C963867B910E628D4DF7685307BAA31A106EF6180D817174D
                                                SHA-512:2234CB5484ED783FD5955BAA6811345EB9A8C4A976B80697487A277F3D2002F39DC3C92A399807E8537F97E1CD7EC593E6845E4E02D82052B4FC95BA3837B958
                                                Malicious:false
                                                Reputation:low
                                                Preview: wk......,...................s....R.......j......_k..........................................................................................................................................................................................................................................J...................j...............................................................................................................................~.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Temp\nsvCA57.tmp\qvddvmam.dll
                                                Process:C:\Users\user\Desktop\3NeufRwoxF.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):4608
                                                Entropy (8bit):3.76274363382061
                                                Encrypted:false
                                                SSDEEP:24:e31GSNND0teIASdax/++mMTJK4f9Y/2rY/noNXs+f3SlLRQ0K7ABPnRuV4MPgicT:Cn4I90IKyzJFbfGFN1RuqSm
                                                MD5:E7CB1AB1779B1AACEDD03A0E490E0318
                                                SHA1:9085E849395D59F1EFA1038484A0D99355CFEF51
                                                SHA-256:0668DF84EEDD97C9003610F70F2C9BE76605C40A6452B6B8A739C1BC102330EF
                                                SHA-512:2B482173601C59EB691D230934CACA8C716E07FA18BC8EA388CC8A3B98004C5A5EFADED903E5F3817D9084319ABCBCADF51C698E2D5C254BE0A034044F4FFB85
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 43%
                                                Reputation:low
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z-...C]..C]..C]Z.M]..C].}B\..C]..B]..C].nG\..C].nC\..C].n.]..C].nA\..C]Rich..C]........................PE..L......a...........!......................... ...............................P............@.......................... ..L.... .......0.......................@..<.................................................... ...............................text.../........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@.reloc..<....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Temp\wuatpe
                                                Process:C:\Users\user\Desktop\3NeufRwoxF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):5232
                                                Entropy (8bit):6.1063109867064895
                                                Encrypted:false
                                                SSDEEP:96:2wMTU6r2dfPoqv106Yo2QdQ0xsCqtAE3Lm7eW03d3AKfxWTaAIHq:XMTTr2dIqv106hv0tAYmqA4xWhIHq
                                                MD5:29323A6559E425DA23E2AEA82AB47558
                                                SHA1:C8A00930296EE9259ED13A8AE96DC019C402891E
                                                SHA-256:0295E73A190C03EF64A394D02E8DB03ADACD8D6EBA54131975204CDEAF88D59E
                                                SHA-512:B127F9D563830CD0F11AABC1E20CB906EE9AC16B83BE276162FF1C9F2A002169051630D65ABC06B8750F763A63AF1840C7DDBF30A72967FB2F5E2671FC04E534
                                                Malicious:false
                                                Reputation:low
                                                Preview: ........{.H...{...W..WKE(W..WKE {....E.`...{....uT.uX.E. .....E..$.uT.uX.E. ....E....uT.uX.E. .....E....uT.uX.E. .....E...{mX.nBr..s...ET..E(...EX{ .+..E .}..E .}....+.rX....E .......E.....{..r+ ....{.\..3...u...u...u.A..u.A..u(..u ...lX.@.T.@..h{..u..u.A..E.W..E.... .....<\.[...{.\=....E.....%..T......W..WKE..E...CETkh.E....}X.L....<...E..E...H.}....E....%..T..N... p... v....L....'. .... ........=.. .... ..........{.`W..WKE .E.X....E..E.{m..lN.E.....E.H.E..E.@.E... L.....l>.E..r..s...<=..=$.E .r...!..<=..=$r.r..s...<......'. ..... .....E..W.E ..u. .....E.{m..l.{......E......E..%.......{.HW..WKE .E.`....E..E.{m..lN.E.....E.H.E..E.@.E... ......W|.....E..r..s...<=..=..ET.r...!..<=..=..EX.r...!.<=..=..EL+.r..s...<U..U..E .r...!..<=..=.r.r..s...<...N... ..... .....E.{mP.l..E .}P...O.uP.uL.uX.uT.u. /....E.{m..l.{......E......E..%..L....{.d.E.X....E..E.{m..lN.E.....E.H.E..E.@.E... r.....l>.E..r..s...<=..= .ET.r...!..<=..= r.r..s...<....=.. _.... \....E..V.u

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.937250521287509
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 92.16%
                                                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:3NeufRwoxF.exe
                                                File size:271670
                                                MD5:891fafcb65f039cefac6701bfb8a9253
                                                SHA1:e9ca83ec5e9a9264d251a3379d65dd9dfe92a16a
                                                SHA256:3c6d3aa382ddba97862136aa06c449150810696ef7cb05e7ec0f4ed6895683c4
                                                SHA512:5e7ca6e15580aac04bfcafad2ab3bd681b4fd8808775b4353d543d666231bd85827ea6285eda0046eb661cf5d0609c25c6c247440eef2d26a4952851e16d1a11
                                                SSDEEP:6144:owLFeIPg68CqO4M+7UwS7nC3/WfB5cUnJ3nkr9/:f5Pg69znM3SjcUJ3nkrR
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....

                                                File Icon

                                                Icon Hash:b2a88c96b2ca6a72

                                                Static PE Info

                                                General

                                                Entrypoint:0x403225
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                DLL Characteristics:
                                                Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:099c0646ea7282d232219f8807883be0

                                                Entrypoint Preview

                                                Instruction
                                                sub esp, 00000180h
                                                push ebx
                                                push ebp
                                                push esi
                                                xor ebx, ebx
                                                push edi
                                                mov dword ptr [esp+18h], ebx
                                                mov dword ptr [esp+10h], 00409128h
                                                xor esi, esi
                                                mov byte ptr [esp+14h], 00000020h
                                                call dword ptr [00407030h]
                                                push 00008001h
                                                call dword ptr [004070B4h]
                                                push ebx
                                                call dword ptr [0040727Ch]
                                                push 00000008h
                                                mov dword ptr [00423F58h], eax
                                                call 00007F74A4D1EBB0h
                                                mov dword ptr [00423EA4h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+34h]
                                                push 00000160h
                                                push eax
                                                push ebx
                                                push 0041F450h
                                                call dword ptr [00407158h]
                                                push 004091B0h
                                                push 004236A0h
                                                call 00007F74A4D1E867h
                                                call dword ptr [004070B0h]
                                                mov edi, 00429000h
                                                push eax
                                                push edi
                                                call 00007F74A4D1E855h
                                                push ebx
                                                call dword ptr [0040710Ch]
                                                cmp byte ptr [00429000h], 00000022h
                                                mov dword ptr [00423EA0h], eax
                                                mov eax, edi
                                                jne 00007F74A4D1C07Ch
                                                mov byte ptr [esp+14h], 00000022h
                                                mov eax, 00429001h
                                                push dword ptr [esp+14h]
                                                push eax
                                                call 00007F74A4D1E348h
                                                push eax
                                                call dword ptr [0040721Ch]
                                                mov dword ptr [esp+1Ch], eax
                                                jmp 00007F74A4D1C0D5h
                                                cmp cl, 00000020h
                                                jne 00007F74A4D1C078h
                                                inc eax
                                                cmp byte ptr [eax], 00000020h
                                                je 00007F74A4D1C06Ch
                                                cmp byte ptr [eax], 00000022h
                                                mov byte ptr [eax+eax+00h], 00000000h

                                                Rich Headers

                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x900.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x2c0000x9000xa00False0.409375data3.94693169534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0x2c1900x2e8dataEnglishUnited States
                                                RT_DIALOG0x2c4780x100dataEnglishUnited States
                                                RT_DIALOG0x2c5780x11cdataEnglishUnited States
                                                RT_DIALOG0x2c6980x60dataEnglishUnited States
                                                RT_GROUP_ICON0x2c6f80x14dataEnglishUnited States
                                                RT_MANIFEST0x2c7100x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                Imports

                                                DLLImport
                                                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                                                Possible Origin

                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 14, 2022 04:16:39.761667967 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:39.816807985 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:39.816948891 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.092539072 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.092818022 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.148051023 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.148118019 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.148405075 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.203632116 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.229621887 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.285772085 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.285818100 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.285877943 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.285907984 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.285944939 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.286024094 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.333262920 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.388742924 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.438467979 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.493802071 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.494342089 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.549669981 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.550070047 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.621265888 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.621648073 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.685411930 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.685832977 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.744864941 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.745228052 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.800592899 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.801899910 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.802078962 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.802279949 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.802390099 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.802503109 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.802592993 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.802808046 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.802967072 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803061008 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803212881 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803318977 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803417921 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803519011 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803611994 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803725004 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.803829908 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.857125044 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.857234001 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.857278109 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.857341051 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.857449055 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.857523918 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.857884884 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.857960939 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.858156919 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.858256102 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.858318090 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.858386993 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.858588934 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.858660936 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.858766079 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.858836889 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.912450075 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.912528992 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.912564039 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.912645102 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.912971020 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.912998915 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.913067102 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.913104057 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.913258076 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.913347006 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.913552046 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.913614988 CET49760587192.168.2.477.88.21.158
                                                Jan 14, 2022 04:16:40.913620949 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.913898945 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.967741013 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.967787027 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.967811108 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.967837095 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968221903 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968250990 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968275070 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968300104 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968494892 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968523026 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968693018 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968722105 CET5874976077.88.21.158192.168.2.4
                                                Jan 14, 2022 04:16:40.968800068 CET49760587192.168.2.477.88.21.158

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 14, 2022 04:16:39.710926056 CET4971453192.168.2.48.8.8.8
                                                Jan 14, 2022 04:16:39.729899883 CET53497148.8.8.8192.168.2.4

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Jan 14, 2022 04:16:39.710926056 CET192.168.2.48.8.8.80xe7fdStandard query (0)smtp.yandex.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Jan 14, 2022 04:15:58.456048965 CET8.8.8.8192.168.2.40x6035No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 04:16:39.729899883 CET8.8.8.8192.168.2.40xe7fdNo error (0)smtp.yandex.comsmtp.yandex.ruCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 04:16:39.729899883 CET8.8.8.8192.168.2.40xe7fdNo error (0)smtp.yandex.ru77.88.21.158A (IP address)IN (0x0001)

                                                SMTP Packets

                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Jan 14, 2022 04:16:40.092539072 CET5874976077.88.21.158192.168.2.4220 vla5-8422ddc3185d.qloud-c.yandex.net ESMTP (Want to use Yandex.Mail for your domain? Visit http://pdd.yandex.ru) 1642130200-NCDFImhoWk-GdQSG1m3
                                                Jan 14, 2022 04:16:40.092818022 CET49760587192.168.2.477.88.21.158EHLO 305090
                                                Jan 14, 2022 04:16:40.148118019 CET5874976077.88.21.158192.168.2.4250-vla5-8422ddc3185d.qloud-c.yandex.net
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-SIZE 53477376
                                                250-STARTTLS
                                                250-AUTH LOGIN PLAIN XOAUTH2
                                                250-DSN
                                                250 ENHANCEDSTATUSCODES
                                                Jan 14, 2022 04:16:40.148405075 CET49760587192.168.2.477.88.21.158STARTTLS
                                                Jan 14, 2022 04:16:40.203632116 CET5874976077.88.21.158192.168.2.4220 Go ahead

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:04:16:03
                                                Start date:14/01/2022
                                                Path:C:\Users\user\Desktop\3NeufRwoxF.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\3NeufRwoxF.exe"
                                                Imagebase:0x400000
                                                File size:271670 bytes
                                                MD5 hash:891FAFCB65F039CEFAC6701BFB8A9253
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.656663064.0000000003020000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.656663064.0000000003020000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                General

                                                Start time:04:16:04
                                                Start date:14/01/2022
                                                Path:C:\Users\user\Desktop\3NeufRwoxF.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\3NeufRwoxF.exe"
                                                Imagebase:0x400000
                                                File size:271670 bytes
                                                MD5 hash:891FAFCB65F039CEFAC6701BFB8A9253
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000001.655268530.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.654698567.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000003.730336959.0000000000824000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.653816558.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.653816558.0000000000414000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.734722737.00000000038D1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.734722737.00000000038D1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.734429027.00000000028D1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.734344539.00000000023C0000.00000004.00020000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.734344539.00000000023C0000.00000004.00020000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.734912309.00000000049D2000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.734912309.00000000049D2000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.733760702.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.733760702.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >