Windows Analysis Report microsoft outlook.exe

Overview

General Information

Sample Name: microsoft outlook.exe
Analysis ID: 553252
MD5: 483994a69d86ec2e58ff6468cf049f89
SHA1: 36b1d5e58de9734faa40fe218e415c57e902292e
SHA256: a51cdfc1b836895069dc0e2d8b7e15e13c65714d44278add6ab306061cdbc0c8
Tags: AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Modifies the hosts file
Injects a PE file into a foreign processes
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

AV Detection:

barindex
Found malware configuration
Source: 3.2.microsoft outlook.exe.3515530.3.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "castilloo@cgyasc.com", "Password": "Castle1", "Host": "mail.cgyasc.com"}
Multi AV Scanner detection for submitted file
Source: microsoft outlook.exe Virustotal: Detection: 55% Perma Link
Antivirus / Scanner detection for submitted sample
Source: microsoft outlook.exe Avira: detected
Antivirus detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\nsm4A2D.tmp\wbyrs.dll Avira: detection malicious, Label: TR/Injector.wiefs
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\nsm4A2D.tmp\wbyrs.dll Metadefender: Detection: 17% Perma Link
Source: C:\Users\user\AppData\Local\Temp\nsm4A2D.tmp\wbyrs.dll ReversingLabs: Detection: 81%
Antivirus or Machine Learning detection for unpacked file
Source: 3.0.microsoft outlook.exe.400000.11.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.microsoft outlook.exe.400000.9.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.microsoft outlook.exe.400000.6.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.microsoft outlook.exe.400000.7.unpack Avira: Label: TR/Spy.Gen8
Source: 3.2.microsoft outlook.exe.400000.1.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.microsoft outlook.exe.400000.4.unpack Avira: Label: TR/Spy.Gen8
Source: 3.1.microsoft outlook.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.microsoft outlook.exe.400000.5.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.microsoft outlook.exe.400000.8.unpack Avira: Label: TR/Spy.Gen8
Source: 3.2.microsoft outlook.exe.49a0000.5.unpack Avira: Label: TR/Spy.Gen8

Compliance:

barindex
Uses 32bit PE files
Source: microsoft outlook.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: Binary string: wntdll.pdbUGP source: microsoft outlook.exe, 00000001.00000003.297741302.00000000029C0000.00000004.00000001.sdmp, microsoft outlook.exe, 00000001.00000003.291786394.0000000002B50000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: microsoft outlook.exe, 00000001.00000003.297741302.00000000029C0000.00000004.00000001.sdmp, microsoft outlook.exe, 00000001.00000003.291786394.0000000002B50000.00000004.00000001.sdmp
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00405250 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 1_2_00405250
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00405C22 FindFirstFileA,FindClose, 1_2_00405C22
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00402630 FindFirstFileA, 1_2_00402630
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00404A29 FindFirstFileExW, 3_2_00404A29

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49814 -> 192.185.25.212:587
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
Source: microsoft outlook.exe, 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: microsoft outlook.exe, 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp String found in binary or memory: http://DynDns.comDynDNS
Source: microsoft outlook.exe, 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp String found in binary or memory: http://YcxkAh.com
Source: microsoft outlook.exe, 00000003.00000002.560904754.0000000002863000.00000004.00000001.sdmp, microsoft outlook.exe, 00000003.00000002.560924455.0000000002868000.00000004.00000001.sdmp String found in binary or memory: http://cgyasc.com
Source: microsoft outlook.exe, 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp, microsoft outlook.exe, 00000003.00000002.560924455.0000000002868000.00000004.00000001.sdmp, microsoft outlook.exe, 00000003.00000003.505431063.00000000005E4000.00000004.00000001.sdmp String found in binary or memory: http://d8P2A6TrVo.net
Source: microsoft outlook.exe, 00000003.00000002.560904754.0000000002863000.00000004.00000001.sdmp, microsoft outlook.exe, 00000003.00000002.560924455.0000000002868000.00000004.00000001.sdmp String found in binary or memory: http://mail.cgyasc.com
Source: microsoft outlook.exe String found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: microsoft outlook.exe String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: microsoft outlook.exe, microsoft outlook.exe, 00000003.00000000.297608589.0000000000414000.00000040.00000001.sdmp, microsoft outlook.exe, 00000003.00000002.561213079.0000000003511000.00000004.00000001.sdmp, microsoft outlook.exe, 00000003.00000002.561417373.00000000049A2000.00000040.00000001.sdmp, microsoft outlook.exe, 00000003.00000002.561338501.0000000004950000.00000004.00020000.sdmp, microsoft outlook.exe, 00000003.00000002.557953046.0000000000400000.00000040.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
Source: microsoft outlook.exe, 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
Source: unknown DNS traffic detected: queries for: mail.cgyasc.com

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality for read data from the clipboard
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00404E07 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard, 1_2_00404E07

Spam, unwanted Advertisements and Ransom Demands:

barindex
Modifies the hosts file
Source: C:\Users\user\Desktop\microsoft outlook.exe File written: C:\Windows\System32\drivers\etc\hosts Jump to behavior

System Summary:

barindex
.NET source code contains very large array initializations
Source: 3.2.microsoft outlook.exe.49a0000.5.unpack, u003cPrivateImplementationDetailsu003eu007b2E0BCB56u002d1BBBu002d423Cu002d8F51u002d94A15D000FB6u007d/C7FAB55Bu002d2018u002d4C8Au002dB9C4u002dBB5765976361.cs Large array initialization: .cctor: array initializer size 11982
Uses 32bit PE files
Source: microsoft outlook.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Contains functionality to shutdown / reboot the system
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_004030E3 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, 1_2_004030E3
Detected potential crypto function
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00406043 1_2_00406043
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00404618 1_2_00404618
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_0040681A 1_2_0040681A
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1324 1_2_6F2D1324
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7524 1_2_6F2D7524
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D8326 1_2_6F2D8326
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D173E 1_2_6F2D173E
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1D00 1_2_6F2D1D00
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7903 1_2_6F2D7903
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2F5300 1_2_6F2F5300
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D151E 1_2_6F2D151E
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1B1A 1_2_6F2D1B1A
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7B11 1_2_6F2D7B11
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7D10 1_2_6F2D7D10
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1565 1_2_6F2D1565
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7567 1_2_6F2D7567
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7762 1_2_6F2D7762
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D3847 1_2_6F2D3847
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D777F 1_2_6F2D777F
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1D7B 1_2_6F2D1D7B
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1773 1_2_6F2D1773
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1D48 1_2_6F2D1D48
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1359 1_2_6F2D1359
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D2354 1_2_6F2D2354
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D3847 1_2_6F2D3847
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1B50 1_2_6F2D1B50
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D73A8 1_2_6F2D73A8
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D6E9A 1_2_6F2D6E9A
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D19A4 1_2_6F2D19A4
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1FA4 1_2_6F2D1FA4
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2DC26F 1_2_6F2DC26F
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D17A0 1_2_6F2D17A0
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7BA0 1_2_6F2D7BA0
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D85B5 1_2_6F2D85B5
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1DB4 1_2_6F2D1DB4
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D219E 1_2_6F2D219E
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D3847 1_2_6F2D3847
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1B91 1_2_6F2D1B91
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7D92 1_2_6F2D7D92
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7BE3 1_2_6F2D7BE3
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D17FD 1_2_6F2D17FD
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D69FD 1_2_6F2D69FD
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D15FF 1_2_6F2D15FF
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1BF2 1_2_6F2D1BF2
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D15C9 1_2_6F2D15C9
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7FCB 1_2_6F2D7FCB
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D19DE 1_2_6F2D19DE
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7DDE 1_2_6F2D7DDE
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D17D1 1_2_6F2D17D1
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1BD2 1_2_6F2D1BD2
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D5F3C 1_2_6F2D5F3C
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D9684 1_2_6F2D9684
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D763F 1_2_6F2D763F
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1639 1_2_6F2D1639
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1405 1_2_6F2D1405
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7401 1_2_6F2D7401
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D201D 1_2_6F2D201D
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2FCA16 1_2_6F2FCA16
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D8411 1_2_6F2D8411
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7C10 1_2_6F2D7C10
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1A65 1_2_6F2D1A65
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D2A72 1_2_6F2D2A72
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1CAE 1_2_6F2D1CAE
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2DB220 1_2_6F2DB220
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D78B5 1_2_6F2D78B5
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D5849 1_2_6F2D5849
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1E8C 1_2_6F2D1E8C
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D228F 1_2_6F2D228F
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D8280 1_2_6F2D8280
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D849A 1_2_6F2D849A
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D7A95 1_2_6F2D7A95
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1891 1_2_6F2D1891
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D8293 1_2_6F2D8293
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D6E92 1_2_6F2D6E92
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D1EE0 1_2_6F2D1EE0
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D84F9 1_2_6F2D84F9
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D5689 1_2_6F2D5689
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D20F5 1_2_6F2D20F5
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D6F4C 1_2_6F2D6F4C
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D18C5 1_2_6F2D18C5
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D14C0 1_2_6F2D14C0
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D16DF 1_2_6F2D16DF
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0040A2A5 3_2_0040A2A5
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_008351C0 3_2_008351C0
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0083B448 3_2_0083B448
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_008368E0 3_2_008368E0
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0085E004 3_2_0085E004
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00850068 3_2_00850068
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0085AD98 3_2_0085AD98
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0085C650 3_2_0085C650
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00855718 3_2_00855718
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00856E38 3_2_00856E38
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_022F47A0 3_2_022F47A0
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_022FF738 3_2_022FF738
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_022F46B0 3_2_022F46B0
Sample file is different than original file name gathered from version info
Source: microsoft outlook.exe, 00000001.00000003.291108170.0000000002AD6000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs microsoft outlook.exe
Source: microsoft outlook.exe, 00000001.00000003.299390193.0000000002C6F000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs microsoft outlook.exe
Source: microsoft outlook.exe Binary or memory string: OriginalFilename vs microsoft outlook.exe
Source: microsoft outlook.exe, 00000003.00000000.297608589.0000000000414000.00000040.00000001.sdmp Binary or memory string: OriginalFilenameKPtHjBhBpIsMIgDrnnRFYHUEZfvUGBdFnZMeBP.exe4 vs microsoft outlook.exe
Source: microsoft outlook.exe, 00000003.00000002.561213079.0000000003511000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameKPtHjBhBpIsMIgDrnnRFYHUEZfvUGBdFnZMeBP.exe4 vs microsoft outlook.exe
Source: microsoft outlook.exe, 00000003.00000002.561417373.00000000049A2000.00000040.00000001.sdmp Binary or memory string: OriginalFilenameKPtHjBhBpIsMIgDrnnRFYHUEZfvUGBdFnZMeBP.exe4 vs microsoft outlook.exe
Source: microsoft outlook.exe, 00000003.00000002.557857953.0000000000199000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs microsoft outlook.exe
Source: microsoft outlook.exe, 00000003.00000002.561338501.0000000004950000.00000004.00020000.sdmp Binary or memory string: OriginalFilenameKPtHjBhBpIsMIgDrnnRFYHUEZfvUGBdFnZMeBP.exe4 vs microsoft outlook.exe
Source: microsoft outlook.exe, 00000003.00000002.557953046.0000000000400000.00000040.00000001.sdmp Binary or memory string: OriginalFilenameKPtHjBhBpIsMIgDrnnRFYHUEZfvUGBdFnZMeBP.exe4 vs microsoft outlook.exe
PE file contains strange resources
Source: microsoft outlook.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: microsoft outlook.exe Virustotal: Detection: 55%
Source: C:\Users\user\Desktop\microsoft outlook.exe File read: C:\Users\user\Desktop\microsoft outlook.exe Jump to behavior
Source: microsoft outlook.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\microsoft outlook.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\microsoft outlook.exe "C:\Users\user\Desktop\microsoft outlook.exe"
Source: C:\Users\user\Desktop\microsoft outlook.exe Process created: C:\Users\user\Desktop\microsoft outlook.exe "C:\Users\user\Desktop\microsoft outlook.exe"
Source: C:\Users\user\Desktop\microsoft outlook.exe Process created: C:\Users\user\Desktop\microsoft outlook.exe "C:\Users\user\Desktop\microsoft outlook.exe" Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\microsoft outlook.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\microsoft outlook.exe File created: C:\Users\user\AppData\Local\Temp\nsr49FD.tmp Jump to behavior
Source: classification engine Classification label: mal100.troj.adwa.spyw.evad.winEXE@3/3@2/1
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00402012 CoCreateInstance,MultiByteToWideChar, 1_2_00402012
Source: C:\Users\user\Desktop\microsoft outlook.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_0040411B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA, 1_2_0040411B
Source: C:\Users\user\Desktop\microsoft outlook.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00401489 GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess, 3_2_00401489
Source: 3.2.microsoft outlook.exe.49a0000.5.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 3.2.microsoft outlook.exe.49a0000.5.unpack, A/b2.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: C:\Users\user\Desktop\microsoft outlook.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: Binary string: wntdll.pdbUGP source: microsoft outlook.exe, 00000001.00000003.297741302.00000000029C0000.00000004.00000001.sdmp, microsoft outlook.exe, 00000001.00000003.291786394.0000000002B50000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: microsoft outlook.exe, 00000001.00000003.297741302.00000000029C0000.00000004.00000001.sdmp, microsoft outlook.exe, 00000001.00000003.291786394.0000000002B50000.00000004.00000001.sdmp

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2D6AD3 pushfd ; retf 0000h 1_2_6F2D6AD5
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00401F16 push ecx; ret 3_2_00401F29
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00405C49 GetModuleHandleA,LoadLibraryA,GetProcAddress, 1_2_00405C49
PE file contains an invalid checksum
Source: microsoft outlook.exe Static PE information: real checksum: 0x0 should be: 0x9cc38
Source: wbyrs.dll.1.dr Static PE information: real checksum: 0x3550e should be: 0x3b412

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Users\user\Desktop\microsoft outlook.exe File created: C:\Users\user\AppData\Local\Temp\nsm4A2D.tmp\wbyrs.dll Jump to dropped file
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Source: C:\Users\user\Desktop\microsoft outlook.exe Evasive API call chain: GetPEB, DecisionNodes, ExitProcess
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Source: C:\Users\user\Desktop\microsoft outlook.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Source: C:\Users\user\Desktop\microsoft outlook.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\microsoft outlook.exe TID: 6936 Thread sleep time: -21213755684765971s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe TID: 7000 Thread sleep count: 2268 > 30 Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe TID: 7000 Thread sleep count: 7579 > 30 Jump to behavior
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\microsoft outlook.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Users\user\Desktop\microsoft outlook.exe Window / User API: threadDelayed 2268 Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Window / User API: threadDelayed 7579 Jump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Users\user\Desktop\microsoft outlook.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\microsoft outlook.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\microsoft outlook.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00405250 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 1_2_00405250
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00405C22 FindFirstFileA,FindClose, 1_2_00405C22
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00402630 FindFirstFileA, 1_2_00402630
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00404A29 FindFirstFileExW, 3_2_00404A29
Source: C:\Users\user\Desktop\microsoft outlook.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\microsoft outlook.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\microsoft outlook.exe API call chain: ExitProcess graph end node
Source: microsoft outlook.exe, 00000003.00000003.522728351.0000000005A7E000.00000004.00000001.sdmp, microsoft outlook.exe, 00000003.00000002.562236559.0000000005A70000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll0

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_0040446F
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_00405C49 GetModuleHandleA,LoadLibraryA,GetProcAddress, 1_2_00405C49
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_004067FE GetProcessHeap, 3_2_004067FE
Enables debug privileges
Source: C:\Users\user\Desktop\microsoft outlook.exe Process token adjusted: Debug Jump to behavior
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2FC402 mov eax, dword ptr fs:[00000030h] 1_2_6F2FC402
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2FC706 mov eax, dword ptr fs:[00000030h] 1_2_6F2FC706
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2FC744 mov eax, dword ptr fs:[00000030h] 1_2_6F2FC744
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2FC616 mov eax, dword ptr fs:[00000030h] 1_2_6F2FC616
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_6F2FC6C7 mov eax, dword ptr fs:[00000030h] 1_2_6F2FC6C7
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_004035F1 mov eax, dword ptr fs:[00000030h] 3_2_004035F1
Source: C:\Users\user\Desktop\microsoft outlook.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00401E1D SetUnhandledExceptionFilter, 3_2_00401E1D
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0040446F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_0040446F
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00401C88 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_00401C88
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00401F30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_00401F30

HIPS / PFW / Operating System Protection Evasion:

barindex
Modifies the hosts file
Source: C:\Users\user\Desktop\microsoft outlook.exe File written: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\microsoft outlook.exe Memory written: C:\Users\user\Desktop\microsoft outlook.exe base: 400000 value starts with: 4D5A Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\microsoft outlook.exe Process created: C:\Users\user\Desktop\microsoft outlook.exe "C:\Users\user\Desktop\microsoft outlook.exe" Jump to behavior
Source: microsoft outlook.exe, 00000003.00000002.559696214.0000000000E80000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: microsoft outlook.exe, 00000003.00000002.559696214.0000000000E80000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: microsoft outlook.exe, 00000003.00000002.559696214.0000000000E80000.00000002.00020000.sdmp Binary or memory string: Progman
Source: microsoft outlook.exe, 00000003.00000002.559696214.0000000000E80000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Contains functionality to query CPU information (cpuid)
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_0040208D cpuid 3_2_0040208D
Source: C:\Users\user\Desktop\microsoft outlook.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 3_2_00401B74 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 3_2_00401B74
Source: C:\Users\user\Desktop\microsoft outlook.exe Code function: 1_2_0040594D GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA, 1_2_0040594D

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Modifies the hosts file
Source: C:\Users\user\Desktop\microsoft outlook.exe File written: C:\Windows\System32\drivers\etc\hosts Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected AgentTesla
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4950000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4e64c8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.415058.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4e64c8.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.3515530.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2441458.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2441458.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.415058.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2430000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.3515530.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2430000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.1.microsoft outlook.exe.415058.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.1.microsoft outlook.exe.415058.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.1.microsoft outlook.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4950000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.49a0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000000.297608589.0000000000414000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.300252799.0000000002430000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.561417373.00000000049A2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.561213079.0000000003511000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.298689668.0000000000414000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000001.299532186.0000000000414000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.561338501.0000000004950000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.558241910.00000000004CA000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.557953046.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: microsoft outlook.exe PID: 1752, type: MEMORYSTR
Tries to steal Mail credentials (via file / registry access)
Source: C:\Users\user\Desktop\microsoft outlook.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Source: C:\Users\user\Desktop\microsoft outlook.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Tries to harvest and steal ftp login credentials
Source: C:\Users\user\Desktop\microsoft outlook.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\ Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Users\user\Desktop\microsoft outlook.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\microsoft outlook.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Yara detected Credential Stealer
Source: Yara match File source: 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: microsoft outlook.exe PID: 1752, type: MEMORYSTR

Remote Access Functionality:

barindex
Yara detected AgentTesla
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4950000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4e64c8.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.415058.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4e64c8.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.3515530.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2441458.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2441458.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.415058.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2430000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.3515530.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.microsoft outlook.exe.2430000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.1.microsoft outlook.exe.415058.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.1.microsoft outlook.exe.415058.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.1.microsoft outlook.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.4950000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.415058.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.400000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.microsoft outlook.exe.49a0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.microsoft outlook.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000000.297608589.0000000000414000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.300252799.0000000002430000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.561417373.00000000049A2000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.561213079.0000000003511000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.298689668.0000000000414000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000001.299532186.0000000000414000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.561338501.0000000004950000.00000004.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.558241910.00000000004CA000.00000004.00000020.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.557953046.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.560204130.0000000002511000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: microsoft outlook.exe PID: 1752, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs